From d3b75076339ad196882c65540890f2be59602912 Mon Sep 17 00:00:00 2001 From: md-rafeek <168404052+md-rafeek@users.noreply.github.com> Date: Wed, 1 May 2024 09:56:56 +0530 Subject: [PATCH 001/119] Pydentic custom validation added Separate file added --- plugins/module_utils/pydentic_validation.py | 56 +++++++++++++++++++++ 1 file changed, 56 insertions(+) create mode 100644 plugins/module_utils/pydentic_validation.py diff --git a/plugins/module_utils/pydentic_validation.py b/plugins/module_utils/pydentic_validation.py new file mode 100644 index 0000000000..379a239395 --- /dev/null +++ b/plugins/module_utils/pydentic_validation.py @@ -0,0 +1,56 @@ +#!/usr/bin/python +# below packages for pandas for data customization +# Others are Pydentic module for customized yml input validation purpose +from pydantic import ValidationError +from uuid import UUID, uuid4 +from enum import Enum +from typing_extensions import Annotated +from pydantic import BaseModel, AnyHttpUrl, Field +from pydantic.networks import IPvAnyAddress +from pydantic.functional_validators import AfterValidator +from pydantic_extra_types.mac_address import MacAddress + +""" + All below classes are used for the Pydentic Validation usage. +""" +# This pydentic custom validation like list of family can be update here. +class DeviceFamily(Enum): + SWITCHHUBS = "Switches and Hubs" + +# This is pydentic validation used the validate URL as http:// or https:// +class CheckUrl(BaseModel): + hosturl: AnyHttpUrl + +# This is used to validate names should be atlease one letter required. +class CheckNames(BaseModel): + names: str = Field(min_length=1, frozen=True) + +# This used to check the port number usally will be integer +class CheckPort(BaseModel): + port: int + +# Pydentic model is available to check IP address either ipv4 or ipv6 +class CheckIPaddress(BaseModel): + managementIpAddress: IPvAnyAddress + +# Pydentic model is available to check MAC address +class CheckMACaddress(BaseModel): + macAddress: MacAddress + +# This is used to check the UUID is correct format of UUID4 type +class CheckUUIDtype(BaseModel): + id: UUID = Field(default_factory=uuid4, frozen=False) + +# To check the given input of Device family in the enum list. +class CheckDeviceFamily(BaseModel): + family: DeviceFamily + +# This custom function added to the pydentic validate the specific radio type +def check_radiotype(v: int) -> int: + assert v in (1, 2, 3, 6), f'{v} is not a correct Radio Type' + return v + +# This class to check the Radio type in 1,2,3, 6 +class CheckRadioType(BaseModel): + ap_radiotype: Annotated[int, AfterValidator(check_radiotype)] + From 90dd1a61690a940a0aa0165081fa0f51768173f7 Mon Sep 17 00:00:00 2001 From: md-rafeek <168404052+md-rafeek@users.noreply.github.com> Date: Wed, 1 May 2024 09:58:13 +0530 Subject: [PATCH 002/119] Delete plugins/module_utils/pydentic_validation.py --- plugins/module_utils/pydentic_validation.py | 56 --------------------- 1 file changed, 56 deletions(-) delete mode 100644 plugins/module_utils/pydentic_validation.py diff --git a/plugins/module_utils/pydentic_validation.py b/plugins/module_utils/pydentic_validation.py deleted file mode 100644 index 379a239395..0000000000 --- a/plugins/module_utils/pydentic_validation.py +++ /dev/null @@ -1,56 +0,0 @@ -#!/usr/bin/python -# below packages for pandas for data customization -# Others are Pydentic module for customized yml input validation purpose -from pydantic import ValidationError -from uuid import UUID, uuid4 -from enum import Enum -from typing_extensions import Annotated -from pydantic import BaseModel, AnyHttpUrl, Field -from pydantic.networks import IPvAnyAddress -from pydantic.functional_validators import AfterValidator -from pydantic_extra_types.mac_address import MacAddress - -""" - All below classes are used for the Pydentic Validation usage. -""" -# This pydentic custom validation like list of family can be update here. -class DeviceFamily(Enum): - SWITCHHUBS = "Switches and Hubs" - -# This is pydentic validation used the validate URL as http:// or https:// -class CheckUrl(BaseModel): - hosturl: AnyHttpUrl - -# This is used to validate names should be atlease one letter required. -class CheckNames(BaseModel): - names: str = Field(min_length=1, frozen=True) - -# This used to check the port number usally will be integer -class CheckPort(BaseModel): - port: int - -# Pydentic model is available to check IP address either ipv4 or ipv6 -class CheckIPaddress(BaseModel): - managementIpAddress: IPvAnyAddress - -# Pydentic model is available to check MAC address -class CheckMACaddress(BaseModel): - macAddress: MacAddress - -# This is used to check the UUID is correct format of UUID4 type -class CheckUUIDtype(BaseModel): - id: UUID = Field(default_factory=uuid4, frozen=False) - -# To check the given input of Device family in the enum list. -class CheckDeviceFamily(BaseModel): - family: DeviceFamily - -# This custom function added to the pydentic validate the specific radio type -def check_radiotype(v: int) -> int: - assert v in (1, 2, 3, 6), f'{v} is not a correct Radio Type' - return v - -# This class to check the Radio type in 1,2,3, 6 -class CheckRadioType(BaseModel): - ap_radiotype: Annotated[int, AfterValidator(check_radiotype)] - From e713213da14d021e29495c7a647beb336d3dd041 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sun, 9 Jun 2024 20:24:37 -0700 Subject: [PATCH 003/119] Enhancement get compliance details of device api --- .../network_compliance_workflow_manager.py | 121 ++++++++++++++++-- 1 file changed, 108 insertions(+), 13 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index e696231d31..a8e2c92188 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -88,6 +88,7 @@ task.Task.get_task_by_id task.Task.get_task_tree compliance.Compliance.get_compliance_detail + compliance.Compliance.compliance_details_of_device - Paths used are post /dna/intent/api/v1/compliance/ @@ -95,6 +96,7 @@ get /dna/intent/api/v1/task/{taskId} get /dna/intent/api/v1/task/{taskId}/tree get /dna/intent/api/v1/compliance/detail + get /dna/intent/api/v1/compliance/${deviceUuid}/detail """ EXAMPLES = r""" @@ -608,7 +610,7 @@ def get_device_ids_from_ip(self, ip_address_list): # Log an error message if any exception occurs during the process self.log("Error while fetching device ID for device: '{0}' from Cisco Catalyst Center: {1}".format(device_ip, str(e)), "ERROR") if not mgmt_ip_instance_id_map: - self.msg = "Reachable devices not found in the IP Address List: {0}".format(ip_address_list) + self.msg = "No reachable devices found among the provided IP addresses: {0}".format(', '.join(ip_address_list)) self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) @@ -874,6 +876,107 @@ def get_want(self, config): return self + def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): + """ + Generate a compliance report for devices based on provided parameters. + + This function fetches the compliance details for a list of devices specified + in the run_compliance_params. It maps the device UUIDs to their corresponding + management IPs, and then retrieves the compliance details for each device. + + Args: + run_compliance_params (dict): Parameters for running compliance checks. + Expected to contain "deviceUuids" and optionally "categories". + mgmt_ip_instance_id_map (dict): Mapping of device management IPs to device UUIDs. + + Returns: + dict: A dictionary with device management IPs as keys and lists of compliance details as values. + """ + + # Initialize the lists/dicts + final_response = {} + device_list = [] + compliance_details_of_device_params = {} + + # Iterate through each device UUID in the run compliance parameters + for device_uuid in run_compliance_params["deviceUuids"]: + + # Find the corresponding device IP for the given device UUID + for device_ip, device_id in mgmt_ip_instance_id_map.items(): + if device_uuid == device_id: + device_ip = device_ip + break + + # Add the device IP to the device list + device_list.append(device_ip) + + # Initialize the response list for the device IP if not already present + if device_ip not in final_response.keys(): + final_response[device_ip] = [] + + # Check if categories are specified and fetch details for each category of the device + if "categories" in run_compliance_params.keys(): + for category in run_compliance_params["categories"]: + compliance_details_of_device_params["category"] = category + compliance_details_of_device_params["device_uuid"] = device_uuid + compliance_details_of_device_params["diff_list"] = True + + response = self.get_compliance_details_of_device(compliance_details_of_device_params, device_ip) + final_response[device_ip].extend(response) + + else: + # Fetch compliance details for the device without specific category + compliance_details_of_device_params["device_uuid"] = device_uuid + compliance_details_of_device_params["diff_list"] = True + response = self.get_compliance_details_of_device(compliance_details_of_device_params, device_ip) + final_response[device_ip].extend(response) + + # If no compliance details were found, update the result with an error message + if not final_response: + self.msg = "No Compliance Details found for the devices: {0}".format(', '.join(device_list)) + self.update_result("failed", False, self.msg, "ERROR") + self.check_return_status() + + return final_response + + def get_compliance_details_of_device(self, compliance_details_of_device_params, device_ip): + """ + Retrieve compliance details for a specific device. + + This function makes an API call to fetch compliance details for a given device + using the specified parameters. It handles the API response and logs the + necessary information. + + Args: + compliance_details_of_device_params (dict): Parameters required for the compliance details API call. + device_ip (str): The IP address of the device for which compliance details are being fetched. + + Returns: + dict or None: The response from the compliance details API call if successful, + None if an error occurs or no response is received. + """ + try: + # Make the API call to fetch compliance details for the device + response = self.dnac_apply["exec"]( + family="compliance", + function="compliance_details_of_device", + params=compliance_details_of_device_params, + op_modifies=True + ) + self.log("Response received post 'compliance_details_of_device' API call: {0}".format(str(response)), "DEBUG") + + if response: + response = response.response + else: + self.log("No response received from the 'compliance_details_of_device' API call.", "ERROR") + return response + except Exception as e: + # Handle any exceptions that occur during the API call + msg = ("An error occurred while retrieving Compliance Details for device:{0} using 'compliance_details_of_device' API call" + ". Error: {1}".format(device_ip, str(e))) + self.log(msg, "ERROR") + return None + def get_compliance_detail(self, compliance_detail_params): """ Execute the GET compliance detail operation. @@ -938,6 +1041,7 @@ def modify_compliance_response(self, response, mgmt_ip_instance_id_map): modified_response[ip_address] = [] modified_response[ip_address].append(item) + self.log("Modified compliance detail response: {0}".format(modified_response), "DEBUG") return modified_response def run_compliance(self, run_compliance_params): @@ -1212,22 +1316,13 @@ def get_compliance_task_status(self, task_id, mgmt_ip_instance_id_map): # Check if task completed successfully elif not response.get("isError") and "success" in response.get("progress").lower(): # Task completed successfully - self.msg = "{0} has completed successfully on device(s): {1}".format(task_name, list(mgmt_ip_instance_id_map.keys())) + self.msg = "{0} has completed successfully on device(s): {1}".format(task_name, ', '.join(list(mgmt_ip_instance_id_map.keys()))) # Retrieve and modify compliance check details - response = self.get_compliance_detail(self.want.get("compliance_detail_params")) - if not response: - self.msg = "Error Occurred when retrieving Compliance Report after {0} with Task Id {1} for device(s) {2}".format( - task_name, task_id, list(mgmt_ip_instance_id_map.keys())) - self.update_result("failed", False, self.msg, "ERROR") - break - - modified_response = self.modify_compliance_response(response, mgmt_ip_instance_id_map) - self.log("Compliance Report for {0} operation for device(s) {1} : {2}".format( - task_name, list(mgmt_ip_instance_id_map.keys()), modified_response), "INFO") + compliance_report = self.get_compliance_report(self.want.get("run_compliance_params"), mgmt_ip_instance_id_map) # Update result with modified response - self.update_result("success", True, self.msg, "INFO", modified_response) + self.update_result("success", True, self.msg, "INFO", compliance_report) break # Check if task failed From 40accf9c97276441cee70d6ad9133a325ec62fd9 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sun, 9 Jun 2024 20:45:01 -0700 Subject: [PATCH 004/119] Addresed sanity issues --- plugins/modules/network_compliance_workflow_manager.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index a8e2c92188..41d1ab99b3 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -902,9 +902,9 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): for device_uuid in run_compliance_params["deviceUuids"]: # Find the corresponding device IP for the given device UUID - for device_ip, device_id in mgmt_ip_instance_id_map.items(): + for ip, device_id in mgmt_ip_instance_id_map.items(): if device_uuid == device_id: - device_ip = device_ip + device_ip = ip break # Add the device IP to the device list From 74dad25e4a1d6def67e8b36cb978938cefab0eba Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sun, 9 Jun 2024 20:46:37 -0700 Subject: [PATCH 005/119] Addresed sanity issues --- plugins/modules/network_compliance_workflow_manager.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 41d1ab99b3..cfb20bd2c8 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -958,10 +958,10 @@ def get_compliance_details_of_device(self, compliance_details_of_device_params, try: # Make the API call to fetch compliance details for the device response = self.dnac_apply["exec"]( - family="compliance", - function="compliance_details_of_device", - params=compliance_details_of_device_params, - op_modifies=True + family="compliance", + function="compliance_details_of_device", + params=compliance_details_of_device_params, + op_modifies=True ) self.log("Response received post 'compliance_details_of_device' API call: {0}".format(str(response)), "DEBUG") From 79d39edcc81a293c874d9f5ea45c2709a580f33e Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 10 Jun 2024 16:02:55 -0700 Subject: [PATCH 006/119] Addressed PR review comments --- plugins/modules/network_compliance_workflow_manager.py | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index cfb20bd2c8..393244c8c5 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -897,6 +897,7 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): final_response = {} device_list = [] compliance_details_of_device_params = {} + device_ip = None # Iterate through each device UUID in the run compliance parameters for device_uuid in run_compliance_params["deviceUuids"]: @@ -907,6 +908,10 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): device_ip = ip break + if device_ip is None: + self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {}".format(device_uuid, mgmt_ip_instance_id_map)) + continue + # Add the device IP to the device list device_list.append(device_ip) From 26e672b494bbcbabccba14372f0a762335cfa24b Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 10 Jun 2024 16:04:32 -0700 Subject: [PATCH 007/119] Addressed PR review comments --- plugins/modules/network_compliance_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 393244c8c5..b37196cb63 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -909,7 +909,7 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): break if device_ip is None: - self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {}".format(device_uuid, mgmt_ip_instance_id_map)) + self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {}".format(device_uuid, mgmt_ip_instance_id_map), "ERROR") continue # Add the device IP to the device list From fa60d059f16d09ca070e9c34f87284d027d639ad Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 10 Jun 2024 16:09:26 -0700 Subject: [PATCH 008/119] Addressed PR review comments --- plugins/modules/network_compliance_workflow_manager.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index b37196cb63..1ba12600e9 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -909,8 +909,8 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): break if device_ip is None: - self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {}".format(device_uuid, mgmt_ip_instance_id_map), "ERROR") - continue + self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {1}".format(device_uuid, mgmt_ip_instance_id_map), "ERROR") + continue # Add the device IP to the device list device_list.append(device_ip) From 590b01502839c15c9b8f86d9650e79ab07bee2ff Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 11 Jun 2024 14:34:36 +0530 Subject: [PATCH 009/119] Fix the issue of typo error in email notification, parameter 'trust_cert' and 'is_proxy_route' was not updating in webhook destination --- ...nts_and_notifications_workflow_manager.yml | 4 +- ...ents_and_notifications_workflow_manager.py | 151 ++++++++++-------- 2 files changed, 90 insertions(+), 65 deletions(-) diff --git a/playbooks/events_and_notifications_workflow_manager.yml b/playbooks/events_and_notifications_workflow_manager.yml index 74874dd52a..fec791484e 100644 --- a/playbooks/events_and_notifications_workflow_manager.yml +++ b/playbooks/events_and_notifications_workflow_manager.yml @@ -28,8 +28,8 @@ method: "{{item.webhook_destination.method}}" trust_cert: "{{item.webhook_destination.trust_cert}}" email_destination: - from_email: "{{item.email_destination.from_email}}" - to_email: "{{item.email_destination.to_email}}" + sender_email: "{{item.email_destination.sender_email}}" + recipient_email: "{{item.email_destination.recipient_email}}" subject: "{{item.email_destination.subject}}" primary_smtp_config: server_address: "{{item.email_destination.primary_smtp_config.server_address}}" diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index c31367b535..861d26f8a1 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -159,11 +159,11 @@ password: description: Password for Authenticating Secondary SMTP Server. type: str - from_email: + sender_email: description: Sender's email address used when setting up or modifying an email destination. type: str required: True - to_email: + recipient_email: description: Recipient's email address that will receive emails when an email destination is created or updated. type: str required: True @@ -570,8 +570,8 @@ state: merged config: - email_destination: - from_email: "test@cisco.com" - to_email: "demo@cisco.com" + sender_email: "test@cisco.com" + recipient_email: "demo@cisco.com" subject: "Ansible testing" primary_smtp_config: server_address: "outbound.cisco.com" @@ -592,8 +592,8 @@ state: merged config: - email_destination: - from_email: "test@cisco.com" - to_email: "demo123@cisco.com" + sender_email: "test@cisco.com" + recipient_email: "demo123@cisco.com" subject: "Ansible updated email config testing" - name: Create Syslog destination with given name. @@ -996,8 +996,8 @@ def validate_input(self): 'username': {'type': 'str'}, 'password': {'type': 'str'}, }, - 'from_email': {'type': 'str'}, - 'to_email': {'type': 'str'}, + 'sender_email': {'type': 'str'}, + 'recipient_email': {'type': 'str'}, 'subject': {'type': 'str'}, }, 'syslog_destination': { @@ -1806,8 +1806,8 @@ def collect_webhook_playbook_params(self, webhook_details): 'description': webhook_details.get('description'), 'url': webhook_details.get('url'), 'method': webhook_details.get('method', 'POST').upper(), - 'trustCert': webhook_details.get('trust_cert', False), - 'isProxyRoute': webhook_details.get('is_proxy_route', True) + 'trustCert': webhook_details.get('trust_cert'), + 'isProxyRoute': webhook_details.get('is_proxy_route') } if webhook_details.get('headers'): @@ -1836,6 +1836,11 @@ def add_webhook_destination(self, webhook_params): """ try: + if webhook_params.get("trustCert") is None: + webhook_params["trustCert"] = False + if webhook_params.get("isProxyRoute") is None: + webhook_params["isProxyRoute"] = True + self.log("Requested payload for creating webhook destination - {0}".format(str(webhook_params)), "INFO") response = self.dnac._exec( family="event_management", @@ -1928,16 +1933,21 @@ def update_webhook_destination(self, webhook_params, webhook_dest_detail_in_ccc) update_webhook_params['description'] = webhook_params.get('description') or webhook_dest_detail_in_ccc.get('description') update_webhook_params['url'] = webhook_params.get('url') or webhook_dest_detail_in_ccc.get('url') update_webhook_params['method'] = webhook_params.get('method') or webhook_dest_detail_in_ccc.get('method') - update_webhook_params['trustCert'] = webhook_params.get('trustCert') or webhook_dest_detail_in_ccc.get('trustCert') - update_webhook_params['isProxyRoute'] = webhook_params.get('isProxyRoute') or webhook_dest_detail_in_ccc.get('isProxyRoute') + update_webhook_params['trustCert'] = webhook_params.get('trustCert') + update_webhook_params['isProxyRoute'] = webhook_params.get('isProxyRoute') update_webhook_params['headers'] = webhook_params.get('headers') + update_webhook_params['webhookId'] = webhook_dest_detail_in_ccc.get('webhookId') + name = update_webhook_params.get('name') + + if update_webhook_params.get("trustCert") is None: + update_webhook_params["trustCert"] = webhook_dest_detail_in_ccc.get('trustCert') + + if update_webhook_params.get("isProxyRoute") is None: + update_webhook_params["isProxyRoute"] = webhook_dest_detail_in_ccc.get('isProxyRoute') if not update_webhook_params['headers'] and webhook_dest_detail_in_ccc.get('headers'): update_webhook_params['headers'] = webhook_dest_detail_in_ccc.get('headers')[0] - update_webhook_params['webhookId'] = webhook_dest_detail_in_ccc.get('webhookId') - name = update_webhook_params.get('name') - response = self.dnac._exec( family="event_management", function='update_webhook_destination', @@ -2022,8 +2032,8 @@ def collect_email_playbook_params(self, email_details): """ playbook_params = { - 'fromEmail': email_details.get('from_email'), - 'toEmail': email_details.get('to_email'), + 'fromEmail': email_details.get('sender_email'), + 'toEmail': email_details.get('recipient_email'), 'subject': email_details.get('subject') } @@ -3728,51 +3738,81 @@ def collect_email_notification_playbook_params(self, email_notification_details) self.status = "failed" self.msg = "Instance name for Subscription Endpoints is required for Email notification '{0}'.".format(email_notf_name) self.log(self.msg, "ERROR") - return self + self.check_return_status() subscription_details = self.get_email_subscription_detail(instance) - instance_id = None - if subscription_details: + if not subscription_details: + instance_id = None + fromEmailAddress = email_notification_details.get("sender_email") + toEmailAddresses = email_notification_details.get("recipient_emails") + subject = email_notification_details.get("subject") + description = email_notification_details.get("instance_description") + else: instance_id = subscription_details.get("instanceId") fromEmailAddress = email_notification_details.get("sender_email") or subscription_details.get("fromEmailAddress") toEmailAddresses = email_notification_details.get("recipient_emails") or subscription_details.get("toEmailAddresses") subject = email_notification_details.get("subject") or subscription_details.get("subject") description = email_notification_details.get("instance_description") or subscription_details.get("description") - if not self.is_valid_email(fromEmailAddress): + if not fromEmailAddress: + self.status = "failed" + self.msg = ( + "Unable to create/update Email event notification as missing the required parameter 'sender_email' " + "in the playbook to create/update the Email Events Subscription Notification" + ) + self.log(self.msg, "ERROR") + self.check_return_status() + + if not toEmailAddresses: + self.status = "failed" + self.msg = ( + "Unable to create/update Email event notification as missing the required parameter 'recipient_emails' " + "in the playbook to create/update the Email Events Subscription Notification" + ) + self.log(self.msg, "ERROR") + self.check_return_status() + + if not subject: + self.status = "failed" + self.msg = ( + "Unable to create/update Email event notification as missing the required parameter 'subject' " + "in the playbook to create/update the Email Events Subscription Notification" + ) + self.log(self.msg, "ERROR") + self.check_return_status() + + if not self.is_valid_email(fromEmailAddress): + self.status = "failed" + self.msg = ( + "Unable to create/update Email event notification as the given sender_email '{0}' " + "are incorrect or invalid given in the playbook." + ).format(fromEmailAddress) + self.log(self.msg, "ERROR") + self.check_return_status() + + for email in toEmailAddresses: + if not self.is_valid_email(email): self.status = "failed" self.msg = ( - "Unable to create/update Email event notification as the given sender_email '{0}' " - "are incorrect or invalid given in the playbook." - ).format(fromEmailAddress) + "Unable to create/update Email event notification as the given recipient_email '{0}' " + "is incorrect or invalid given in the playbook." + ).format(email) self.log(self.msg, "ERROR") self.check_return_status() - for email in toEmailAddresses: - if not self.is_valid_email(email): - self.status = "failed" - self.msg = ( - "Unable to create/update Email event notification as the given recipient_email '{0}' " - "is incorrect or invalid given in the playbook." - ).format(email) - self.log(self.msg, "ERROR") - self.check_return_status() - - temp_subscript_endpoint = { - "instanceId": instance_id, - "subscriptionDetails": { - "connectorType": "EMAIL", - "fromEmailAddress": fromEmailAddress, - "toEmailAddresses": toEmailAddresses, - "subject": subject, - "name": instance, - "description": description - } + temp_subscript_endpoint = { + "instanceId": instance_id, + "subscriptionDetails": { + "connectorType": "EMAIL", + "fromEmailAddress": fromEmailAddress, + "toEmailAddresses": toEmailAddresses, + "subject": subject, + "name": instance, + "description": description } - playbook_params["subscriptionEndpoints"].append(temp_subscript_endpoint) - else: - self.log("No subscription details found for instance '{0}'.".format(instance), "WARNING") + } + playbook_params["subscriptionEndpoints"].append(temp_subscript_endpoint) events = email_notification_details.get('events') if events: @@ -3854,21 +3894,6 @@ def mandatory_email_notification_parameter_check(self, email_notification_params if not description: required_params_absent.append("description") - subs_endpoints = email_notification_params.get('subscriptionEndpoints') - - if not subs_endpoints: - required_params_absent.extends(["instance", "sender_email", "recipient_emails", "subject"]) - else: - subs_endpoints = subs_endpoints[0].get("subscriptionDetails") - if not subs_endpoints.get("fromEmailAddress"): - required_params_absent.append("sender_email") - if not subs_endpoints.get("toEmailAddresses"): - required_params_absent.append("recipient_emails") - if not subs_endpoints.get("subject"): - required_params_absent.append("subject") - if not subs_endpoints.get("name"): - required_params_absent.append("instance") - filters = email_notification_params.get("filter") if not filters: required_params_absent.append("events") @@ -4470,7 +4495,7 @@ def get_diff_merged(self, config): connection_setting = itsm_params.get('data').get('ConnectionSettings') if not connection_setting: - invalid_itsm_params.extends(["url", "username", "password"]) + invalid_itsm_params.extend(["url", "username", "password"]) self.status = "failed" self.msg = ( "Required parameter '{0}' for configuring ITSM Intergartion setting in Cisco Catalyst " From ca52c213cd948bbacfc31cdd85e8be098b838ab3 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 11 Jun 2024 16:54:05 +0530 Subject: [PATCH 010/119] Rename the variable from 'fromEmailAddress' --> sender_email and 'toEmailAddresses' --> recipient_emails --- ...ents_and_notifications_workflow_manager.py | 22 +++++++++---------- 1 file changed, 11 insertions(+), 11 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 861d26f8a1..a8cac092c6 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -3744,18 +3744,18 @@ def collect_email_notification_playbook_params(self, email_notification_details) if not subscription_details: instance_id = None - fromEmailAddress = email_notification_details.get("sender_email") - toEmailAddresses = email_notification_details.get("recipient_emails") + sender_email = email_notification_details.get("sender_email") + recipient_emails = email_notification_details.get("recipient_emails") subject = email_notification_details.get("subject") description = email_notification_details.get("instance_description") else: instance_id = subscription_details.get("instanceId") - fromEmailAddress = email_notification_details.get("sender_email") or subscription_details.get("fromEmailAddress") - toEmailAddresses = email_notification_details.get("recipient_emails") or subscription_details.get("toEmailAddresses") + sender_email = email_notification_details.get("sender_email") or subscription_details.get("fromEmailAddress") + recipient_emails = email_notification_details.get("recipient_emails") or subscription_details.get("toEmailAddresses") subject = email_notification_details.get("subject") or subscription_details.get("subject") description = email_notification_details.get("instance_description") or subscription_details.get("description") - if not fromEmailAddress: + if not sender_email: self.status = "failed" self.msg = ( "Unable to create/update Email event notification as missing the required parameter 'sender_email' " @@ -3764,7 +3764,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) self.log(self.msg, "ERROR") self.check_return_status() - if not toEmailAddresses: + if not recipient_emails: self.status = "failed" self.msg = ( "Unable to create/update Email event notification as missing the required parameter 'recipient_emails' " @@ -3782,16 +3782,16 @@ def collect_email_notification_playbook_params(self, email_notification_details) self.log(self.msg, "ERROR") self.check_return_status() - if not self.is_valid_email(fromEmailAddress): + if not self.is_valid_email(sender_email): self.status = "failed" self.msg = ( "Unable to create/update Email event notification as the given sender_email '{0}' " "are incorrect or invalid given in the playbook." - ).format(fromEmailAddress) + ).format(sender_email) self.log(self.msg, "ERROR") self.check_return_status() - for email in toEmailAddresses: + for email in recipient_emails: if not self.is_valid_email(email): self.status = "failed" self.msg = ( @@ -3805,8 +3805,8 @@ def collect_email_notification_playbook_params(self, email_notification_details) "instanceId": instance_id, "subscriptionDetails": { "connectorType": "EMAIL", - "fromEmailAddress": fromEmailAddress, - "toEmailAddresses": toEmailAddresses, + "fromEmailAddress": sender_email, + "toEmailAddresses": recipient_emails, "subject": subject, "name": instance, "description": description From 21d6193ba8b074a9af9c7f09b35798fc96b05765 Mon Sep 17 00:00:00 2001 From: Madhan Date: Tue, 11 Jun 2024 20:51:47 +0530 Subject: [PATCH 011/119] Adding circleci --- .circleci/config.yml | 0 1 file changed, 0 insertions(+), 0 deletions(-) create mode 100644 .circleci/config.yml diff --git a/.circleci/config.yml b/.circleci/config.yml new file mode 100644 index 0000000000..e69de29bb2 From d84a4b143fee2a6c8f57e9c4b4f1089e053f8d72 Mon Sep 17 00:00:00 2001 From: Madhan Date: Tue, 11 Jun 2024 20:55:19 +0530 Subject: [PATCH 012/119] Adding config in circleci --- .circleci/config.yml | 332 +++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 332 insertions(+) diff --git a/.circleci/config.yml b/.circleci/config.yml index e69de29bb2..c67aeb70fb 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -0,0 +1,332 @@ +version: 2.1 + +setup: << pipeline.parameters.run-setup >> + +orbs: + path-filtering: circleci/path-filtering@0.1.7 + +parameters: + run-setup: + type: boolean + default: true + run-any: + type: boolean + default: false + run-all: + type: boolean + default: false + run-site: + type: boolean + default: false + run-devicecredential: + type: boolean + default: false + run-discovery: + type: boolean + default: false + run-inventory: + type: boolean + default: false + run-swim: + type: boolean + default: false + run-pnp: + type: boolean + default: false + +jobs: + + pre: + parameters: + ansible_cisco_dnac_version: + type: string + default: "6.9.0" + + #machine: true + docker: + - image: python:3.8.10 + resource_class: rukapse/dnacenter-ansible-minikube + + environment: + CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> + CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + + steps: + - run: + name: Debug information for pre + command: | + set -x + echo "REPO_URL: $REPO_URL" + echo "CIRCLE_PROJECT_REPONAME: $CIRCLE_PROJECT_REPONAME" + echo "CIRCLE_PROJECT_BRANCHNAME: $CIRCLE_PROJECT_BRANCHNAME" + + build: + parameters: + ansible_cisco_dnac_version: + type: string + default: "6.9.0" + + #machine: true + docker: + - image: python:3.8.10 + resource_class: rukapse/dnacenter-ansible-minikube + environment: + REPO_URL: << pipeline.trigger_parameters.github_app.repo_url >> + CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> + CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + steps: + - run: + name: Debug information + command: | + echo "REPO_URL: $REPO_URL" + echo "CIRCLE_PROJECT_REPONAME: $CIRCLE_PROJECT_REPONAME" + echo "CIRCLE_PROJECT_BRANCHNAME: $CIRCLE_PROJECT_BRANCHNAME" + - restore_cache: + keys: + - collection-<< pipeline.git.revision >> + - run: + name: Skip if already build + command: | + if [ $(ls workspace/*tar.gz) ]; then + ls -alh workspace + circleci-agent step halt + fi + - run: + name: Clone repo to workspace + command: git clone --depth=1 -b $CIRCLE_PROJECT_BRANCHNAME $REPO_URL . + + - restore_cache: + keys: + - pip-cache-{{ checksum "test-requirements.txt" }} + - run: + name: Activate Virtual Environment, Install ansible and Build collection tarball + command: | + # Install ansible, dnacentersdk + pip install --upgrade pip + pip install -r test-requirements.txt + # Build collection and store resulting tarball in directory $HOME/.cache/v<< parameters.ansible_cisco_dnac_version >>/collection-tarballs + ansible-galaxy collection build --force --output-path workspace/ + - save_cache: + key: collection-<< pipeline.git.revision >> + paths: + - 'workspace' + - save_cache: + key: pip-cache-{{ checksum "test-requirements.txt" }} + paths: + - ~/.cache/pip + + addrole: + #machine: true + docker: + - image: python:3.8.10 + resource_class: rukapse/dnacenter-ansible-minikube + + steps: + - run: + name: Create Roles File header + command: | + mkdir -p roles-file + echo "---" > roles-file/ccc_roles.yml + echo "- hosts: dnac_servers" >> roles-file/ccc_roles.yml + echo " gather_facts: no" >> roles-file/ccc_roles.yml + echo " connection: local" >> roles-file/ccc_roles.yml + echo " " >> roles-file/ccc_roles.yml + echo " tasks:" >> roles-file/ccc_roles.yml + echo " " >> roles-file/ccc_roles.yml + echo " vars:" >> roles-file/ccc_roles.yml + echo " debug: false" >> roles-file/ccc_roles.yml + echo " " >> roles-file/ccc_roles.yml + echo " roles:" >> roles-file/ccc_roles.yml + - when: + condition: + or: [ << pipeline.parameters.run-site >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_site_management" >> roles-file/ccc_roles.yml + + - when: + condition: + or: [ << pipeline.parameters.run-devicecredential >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_device_credential_management" >> roles-file/ccc_roles.yml + + - when: + condition: + or: [ << pipeline.parameters.run-discovery >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_discovery_management" >> roles-file/ccc_roles.yml + + - when: + condition: + or: [ << pipeline.parameters.run-inventory >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_inventory_management" >> roles-file/ccc_roles.yml + + - when: + condition: + or: [ << pipeline.parameters.run-swim >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_swim_management" >> roles-file/ccc_roles.yml + + + - when: + condition: + or: [ << pipeline.parameters.run-pnp >>, << pipeline.parameters.run-all >> ] + steps: + - run: + command: | + echo " - ccc_pnp_management" >> roles-file/ccc_roles.yml + + - persist_to_workspace: + root: 'roles-file' + paths: + - 'ccc_roles.yml' + sanity-tests: + parameters: + ansible_cisco_dnac_version: + type: string + default: "6.9.0" + + #machine: true + docker: + - image: python:3.8.10 + resource_class: rukapse/dnacenter-ansible-minikube + + environment: + REPO_URL: << pipeline.trigger_parameters.github_app.repo_url >> + CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> + CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + + steps: + - run: + name: Debug information + command: | + echo "REPO_URL: $REPO_URL" + echo "CIRCLE_PROJECT_REPONAME: $CIRCLE_PROJECT_REPONAME" + echo "CIRCLE_PROJECT_BRANCHNAME: $CIRCLE_PROJECT_BRANCHNAME" + + - run: + name: Clone repo to workspace + command: git clone --depth=1 -b $CIRCLE_PROJECT_BRANCHNAME $REPO_URL . + + - attach_workspace: + at: roles-file + + - restore_cache: + keys: + - collection-<< pipeline.git.revision >> + - restore_cache: + keys: + - pip-cache-{{ checksum "test-requirements.txt" }} + - run: + name: Activate Virtual Environment, Install ansible and Build collection tarball + command: | + # Install ansible, dnacentersdk + pip install --upgrade pip + pip install -r test-requirements.txt + ansible --version + - run: + name: Install the collection tarball + command: | + python --version + ansible --version + ansible-galaxy collection install --force workspace/*.tar.gz + - run: + name: Copy static files + command: | + mkdir -p group_vars + cp roles-file/ccc_roles.yml ccc_roles.yml + echo ${GROUP_VARS} | base64 -d > group_vars/dnac_servers.yml + echo ${DNAC_HOSTS} | base64 -d > hosts + - run: + name: Run sanity tests + command: | + export ANSIBLE_PERSISTENT_CONNECT_TIMEOUT=1000 + export ANSIBLE_PERSISTENT_COMMAND_TIMEOUT=1000 + export ANSIBLE_ROLES_PATH=$PWD/tests/integration + ansible-playbook -i hosts ccc_roles.yml + + no_output_timeout: 120m + + post_pnp_testing: + #machine: true + docker: + - image: python:3.8.10 + resource_class: rukapse/dnacenter-ansible-minikube + + steps: + - when: + condition: << pipeline.parameters.run-pnp >> + steps: + - run: + command: | + python ${HOME}/static/pnp_script.py #TODO + +workflows: + + building: + when: << pipeline.parameters.run-setup >> + jobs: + - pre + + - build: + matrix: + parameters: + ansible_cisco_dnac_version: + - "6.9.0" + requires: + - pre + + - path-filtering/filter: + requires: + - build + base-revision: main + config-path: .circleci/config.yml + mapping: | + .* run-setup false + + plugins/.* run-any true + tests/integration/.* run-any true + + plugins/module_utils/.* run-all true + + plugins/modules/site_workflow_manager.py run-site true + plugins/modules/device_credential_workflow_manager.py run-devicecredential true + plugins/modules/discovery_workflow_manager.py run-discovery true + plugins/modules/inventory_workflow_manager.py run-inventory true + plugins/modules/swim_workflow_manager.py run-swim true + plugins/modules/pnp_workflow_manager.py run-pnp true + + tests/integration/ccc_site_management/.* run-site true + tests/integration/ccc_device_credential_management/.* run-devicecredential true + tests/integration/ccc_discovery_management/.* run-discovery true + tests/integration/ccc_inventory_management/.* run-inventory true + tests/integration/ccc_swim_management/.* run-swim true + tests/integration/ccc_pnp_management/.* run-pnp true + + testing: + when: << pipeline.parameters.run-any >> + jobs: + - addrole + - sanity-tests: + requires: + - addrole + context: + - dnac-servers + matrix: + parameters: + ansible_cisco_dnac_version: + - "6.9.0" + # - post_pnp_testing: + # requires: + # - sanity-tests + From 98e9c22a4cd4af99e03dca4d220270da54a1025c Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Tue, 11 Jun 2024 11:24:49 -0700 Subject: [PATCH 013/119] Addressed review comments --- plugins/modules/network_compliance_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 1ba12600e9..49ceed1974 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -909,7 +909,7 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): break if device_ip is None: - self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {1}".format(device_uuid, mgmt_ip_instance_id_map), "ERROR") + self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {1}".format(device_uuid, mgmt_ip_instance_id_map), "DEBUG") continue # Add the device IP to the device list From 8859c910a66f2dab7ccf2ee3904c085a9debeb3e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 12 Jun 2024 12:38:15 +0530 Subject: [PATCH 014/119] Gave different error message for 'INPROGRESS' and 'FAILED' state --- .../ise_radius_integration_workflow_manager.py | 16 ++++++++++++---- 1 file changed, 12 insertions(+), 4 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index d8d463f508..d4325c097a 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1077,8 +1077,8 @@ def get_want_authentication_policy_server(self, auth_policy_server): else: try: ise_integration_wait_time_int = int(ise_integration_wait_time) - if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 60: - self.msg = "The ise_integration_wait_time should be from 1 to 60 seconds." + if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 100: + self.msg = "The ise_integration_wait_time should be from 1 to 100 seconds." self.status = "failed" return self @@ -1282,9 +1282,17 @@ def update_auth_policy_server(self, ipAddress): ise_server_details = get_dict_result(response, "ipAddress", ipAddress) ise_state_set = {"FAILED", "INPROGRESS"} state = ise_server_details.get("state") + if state == "INPROGRESS": + self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'." \ + .format(ipAddress) + elif state == "FAILED": + self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is 'FAILED'." \ + .format(ipAddress) + if self.want.get("trusted_server") is False: + self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ + "this certificate from Cisco ISE, and it is not yet trusted." + if state in ise_state_set: - self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is '{1}'. ".format(ipAddress, state) + \ - "Expected states for successful integration are not in {0}.".format(ise_state_set) self.log(str(self.msg), "ERROR") self.status = "failed" return From 1c982712335ecd91c6ebc5aabefef2bc98024faa Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 12 Jun 2024 12:41:38 +0530 Subject: [PATCH 015/119] Changed the ise_integration_wait_time maximum limit from 60 to 120 --- plugins/modules/ise_radius_integration_workflow_manager.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index d4325c097a..612e29fc71 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -206,7 +206,7 @@ ise_integration_wait_time: description: - Indicates the sleep time after initiating the Cisco ISE integration process. - - Maximum sleep time should be less or equal to 60 seconds. + - Maximum sleep time should be less or equal to 120 seconds. default: 20 type: int requirements: @@ -1077,8 +1077,8 @@ def get_want_authentication_policy_server(self, auth_policy_server): else: try: ise_integration_wait_time_int = int(ise_integration_wait_time) - if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 100: - self.msg = "The ise_integration_wait_time should be from 1 to 100 seconds." + if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 120: + self.msg = "The ise_integration_wait_time should be from 1 to 120 seconds." self.status = "failed" return self From b776b3b25fa1355c240f37b957f4f6c7943bd87e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 12 Jun 2024 12:56:48 +0530 Subject: [PATCH 016/119] Improved the error message for 'INPROGRESS' state --- plugins/modules/ise_radius_integration_workflow_manager.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 612e29fc71..b199770907 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1283,8 +1283,8 @@ def update_auth_policy_server(self, ipAddress): ise_state_set = {"FAILED", "INPROGRESS"} state = ise_server_details.get("state") if state == "INPROGRESS": - self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'." \ - .format(ipAddress) + self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'. ".format(ipAddress) + \ + "Integration took more than '{0}' seconds.".format(ise_integration_wait_time) elif state == "FAILED": self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is 'FAILED'." \ .format(ipAddress) From 5e570966ba395bc5a40dddf1270786e965e1cf51 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 12 Jun 2024 14:35:14 +0530 Subject: [PATCH 017/119] Addressed the review comments --- ...ise_radius_integration_workflow_manager.py | 20 +++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index b199770907..0bf0414cb9 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1282,17 +1282,17 @@ def update_auth_policy_server(self, ipAddress): ise_server_details = get_dict_result(response, "ipAddress", ipAddress) ise_state_set = {"FAILED", "INPROGRESS"} state = ise_server_details.get("state") - if state == "INPROGRESS": - self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'. ".format(ipAddress) + \ - "Integration took more than '{0}' seconds.".format(ise_integration_wait_time) - elif state == "FAILED": - self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is 'FAILED'." \ - .format(ipAddress) - if self.want.get("trusted_server") is False: - self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ - "this certificate from Cisco ISE, and it is not yet trusted." - if state in ise_state_set: + if state == "INPROGRESS": + self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'. ".format(ipAddress) + \ + "Integration took more than '{0}' seconds.".format(ise_integration_wait_time) + elif state == "FAILED": + self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is 'FAILED'." \ + .format(ipAddress) + if self.want.get("trusted_server") is False: + self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ + "this certificate from Cisco ISE, and it is not yet trusted." + self.log(str(self.msg), "ERROR") self.status = "failed" return From 76a99771c13612bf9dc3c7631649acfde68c3d87 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 12 Jun 2024 16:51:12 +0530 Subject: [PATCH 018/119] Addressed the review comments --- .../modules/ise_radius_integration_workflow_manager.py | 9 +++++---- 1 file changed, 5 insertions(+), 4 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 0bf0414cb9..cb8ce9b93e 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1284,11 +1284,12 @@ def update_auth_policy_server(self, ipAddress): state = ise_server_details.get("state") if state in ise_state_set: if state == "INPROGRESS": - self.msg = "The Cisco ISE server '{0}' integration is not completed. The state is 'INPROGRESS'. ".format(ipAddress) + \ - "Integration took more than '{0}' seconds.".format(ise_integration_wait_time) + self.msg = "The Cisco ISE server '{ip}' integration is incomplete, currently in 'INPROGRESS' state. ".format(ip=ipAddress) + \ + "The integration has exceeded the expected duration of '{wait_time}' second(s)." \ + .format(wait_time=ise_integration_wait_time) elif state == "FAILED": - self.msg = "The Cisco ISE server '{0}' integration is not successful. The state is 'FAILED'." \ - .format(ipAddress) + self.msg = "The Cisco ISE server '{ip}' integration has failed and in 'FAILED' state." \ + .format(ip=ipAddress) if self.want.get("trusted_server") is False: self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ "this certificate from Cisco ISE, and it is not yet trusted." From e235a7f5ce4dfb5489f95e1a9b51f48f8bb0ccc6 Mon Sep 17 00:00:00 2001 From: Abinash Date: Wed, 12 Jun 2024 15:50:47 +0000 Subject: [PATCH 019/119] Changing the name from desc to description --- plugins/modules/discovery_intent.py | 20 +++++++++---------- plugins/modules/discovery_workflow_manager.py | 20 +++++++++---------- 2 files changed, 20 insertions(+), 20 deletions(-) diff --git a/plugins/modules/discovery_intent.py b/plugins/modules/discovery_intent.py index 5d222ac6ff..8461207587 100644 --- a/plugins/modules/discovery_intent.py +++ b/plugins/modules/discovery_intent.py @@ -145,7 +145,7 @@ - SNMP v2 also delivers data encryptions, but it uses data types. type: dict suboptions: - desc: + description: description: Name/Description of the SNMP read credential to be used for creation of snmp_v2_read_credential. type: str community: @@ -157,7 +157,7 @@ - SNMP v2 also delivers data encryptions, but it uses data types. type: dict suboptions: - desc: + description: description: Name/Description of the SNMP write credential to be used for creation of snmp_v2_write_credential. type: str community: @@ -393,10 +393,10 @@ port: 443 secure: True snmp_v2_read_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v2_write_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v3_credential: username: v3Public2 @@ -467,10 +467,10 @@ port: 443 secure: True snmp_v2_read_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v2_write_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v3_credential: username: v3Public2 @@ -1168,24 +1168,24 @@ def handle_discovery_specific_credentials(self, new_object_params=None): new_object_params['httpWriteCredential'] = http_write_credential if snmp_v2_read_credential: - if not (snmp_v2_read_credential.get('desc')) and isinstance(snmp_v2_read_credential.get('desc'), str): + if not (snmp_v2_read_credential.get('description')) and isinstance(snmp_v2_read_credential.get('description'), str): msg = "Name/description for the SNMP v2 read credential must be of string type" self.discovery_specific_cred_failure(msg=msg) if not (snmp_v2_read_credential.get('community')) and isinstance(snmp_v2_read_credential.get('community'), str): msg = "The community string must be of string type" self.discovery_specific_cred_failure(msg=msg) - new_object_params['snmpROCommunityDesc'] = snmp_v2_read_credential.get('desc') + new_object_params['snmpROCommunityDesc'] = snmp_v2_read_credential.get('description') new_object_params['snmpROCommunity'] = snmp_v2_read_credential.get('community') new_object_params['snmpVersion'] = "v2" if snmp_v2_write_credential: - if not (snmp_v2_write_credential.get('desc')) and isinstance(snmp_v2_write_credential.get('desc'), str): + if not (snmp_v2_write_credential.get('description')) and isinstance(snmp_v2_write_credential.get('description'), str): msg = "Name/description for the SNMP v2 write credential must be of string type" self.discovery_specific_cred_failure(msg=msg) if not (snmp_v2_write_credential.get('community')) and isinstance(snmp_v2_write_credential.get('community'), str): msg = "The community string must be of string type" self.discovery_specific_cred_failure(msg=msg) - new_object_params['snmpRWCommunityDesc'] = snmp_v2_write_credential.get('desc') + new_object_params['snmpRWCommunityDesc'] = snmp_v2_write_credential.get('description') new_object_params['snmpRWCommunity'] = snmp_v2_write_credential.get('community') new_object_params['snmpVersion'] = "v2" diff --git a/plugins/modules/discovery_workflow_manager.py b/plugins/modules/discovery_workflow_manager.py index e6305ac8b4..c6e6161b80 100644 --- a/plugins/modules/discovery_workflow_manager.py +++ b/plugins/modules/discovery_workflow_manager.py @@ -145,7 +145,7 @@ - SNMP v2 also delivers data encryptions, but it uses data types. type: dict suboptions: - desc: + description: description: Name/Description of the SNMP read credential to be used for creation of snmp_v2_read_credential. type: str community: @@ -157,7 +157,7 @@ - SNMP v2 also delivers data encryptions, but it uses data types. type: dict suboptions: - desc: + description: description: Name/Description of the SNMP write credential to be used for creation of snmp_v2_write_credential. type: str community: @@ -393,10 +393,10 @@ port: 443 secure: True snmp_v2_read_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v2_write_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v3_credential: username: v3Public2 @@ -467,10 +467,10 @@ port: 443 secure: True snmp_v2_read_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v2_write_credential: - desc: snmp_v2-new + description: snmp_v2-new community: Cisco123 snmp_v3_credential: username: v3Public2 @@ -1168,24 +1168,24 @@ def handle_discovery_specific_credentials(self, new_object_params=None): new_object_params['httpWriteCredential'] = http_write_credential if snmp_v2_read_credential: - if not (snmp_v2_read_credential.get('desc')) and isinstance(snmp_v2_read_credential.get('desc'), str): + if not (snmp_v2_read_credential.get('description')) and isinstance(snmp_v2_read_credential.get('description'), str): msg = "Name/description for the SNMP v2 read credential must be of string type" self.discovery_specific_cred_failure(msg=msg) if not (snmp_v2_read_credential.get('community')) and isinstance(snmp_v2_read_credential.get('community'), str): msg = "The community string must be of string type" self.discovery_specific_cred_failure(msg=msg) - new_object_params['snmpROCommunityDesc'] = snmp_v2_read_credential.get('desc') + new_object_params['snmpROCommunityDesc'] = snmp_v2_read_credential.get('description') new_object_params['snmpROCommunity'] = snmp_v2_read_credential.get('community') new_object_params['snmpVersion'] = "v2" if snmp_v2_write_credential: - if not (snmp_v2_write_credential.get('desc')) and isinstance(snmp_v2_write_credential.get('desc'), str): + if not (snmp_v2_write_credential.get('description')) and isinstance(snmp_v2_write_credential.get('description'), str): msg = "Name/description for the SNMP v2 write credential must be of string type" self.discovery_specific_cred_failure(msg=msg) if not (snmp_v2_write_credential.get('community')) and isinstance(snmp_v2_write_credential.get('community'), str): msg = "The community string must be of string type" self.discovery_specific_cred_failure(msg=msg) - new_object_params['snmpRWCommunityDesc'] = snmp_v2_write_credential.get('desc') + new_object_params['snmpRWCommunityDesc'] = snmp_v2_write_credential.get('description') new_object_params['snmpRWCommunity'] = snmp_v2_write_credential.get('community') new_object_params['snmpVersion'] = "v2" From 432709a7936646bdc26a537284f94cd060dc4c5f Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Wed, 12 Jun 2024 16:41:08 -0700 Subject: [PATCH 020/119] Minor Bug - network_compliance module: --- plugins/modules/network_compliance_workflow_manager.py | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 49ceed1974..e4cd872cb7 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -1373,7 +1373,7 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): # Handle error if task execution encounters an error if response[0].get("isError"): - failure_reason = response.get("failureReason") + failure_reason = response[0].get("failureReason") self.handle_error(task_name, mgmt_ip_instance_id_map, failure_reason) break @@ -1382,7 +1382,9 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): for ip, device_id in mgmt_ip_instance_id_map.items(): if device_id in progress and "copy_Running_To_Startup=Success" in progress: success_devices.append(ip) + self.log("{0} operation completed successfully on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") elif device_id in progress and "copy_Running_To_Startup=Failed" in progress: + self.log("{0} operation FAILED on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") failed_devices.append(ip) success_devices = set(success_devices) From 03d98968377ae093fcb3b9bd43c3c1372d1b6f12 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Wed, 12 Jun 2024 16:49:23 -0700 Subject: [PATCH 021/119] Minor Bug - network_compliance module: --- plugins/modules/network_compliance_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index e4cd872cb7..56f6d16b52 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -1384,7 +1384,7 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): success_devices.append(ip) self.log("{0} operation completed successfully on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") elif device_id in progress and "copy_Running_To_Startup=Failed" in progress: - self.log("{0} operation FAILED on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") + self.log("{0} operation FAILED on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") failed_devices.append(ip) success_devices = set(success_devices) From d2e1e6c0d17092840abb2567d49f5b5606339217 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Thu, 13 Jun 2024 09:07:53 +0530 Subject: [PATCH 022/119] Added a maximum timeout for running a infinite loop --- .../modules/ise_radius_integration_workflow_manager.py | 9 +++++++++ 1 file changed, 9 insertions(+) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index cb8ce9b93e..0d94789676 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -422,6 +422,7 @@ class IseRadiusIntegration(DnacBase): def __init__(self, module): super().__init__(module) + self.max_timeout = self.params.get('dnac_api_task_timeout') self.result["response"] = [ {"authenticationPolicyServer": {"response": {}, "msg": {}}} ] @@ -1237,7 +1238,15 @@ def update_auth_policy_server(self, ipAddress): task_id = response.get("taskId") is_certificate_required = False + start_time = time.time() while True: + end_time = time.time() + if (end_time - start_time) >= self.max_timeout: + self.log("Max timeout of {0} sec has reached for the execution id '{1}'. Exiting the loop due to " + "unexpected API 'add_authentication_and_policy_server_access_configuration' status." + .format(self.max_timeout, task_id), "WARNING") + break + task_details = self.get_task_details(task_id) self.log('Getting task details from task ID {0}: {1}'.format(task_id, task_details), "DEBUG") if task_details.get("isError") is True: From 4cca207d232d6891f84ef6a578dc34c8c8875d3e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Thu, 13 Jun 2024 09:09:54 +0530 Subject: [PATCH 023/119] Resolved the sanity errors --- plugins/modules/ise_radius_integration_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 0d94789676..f3346c6a9e 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1244,7 +1244,7 @@ def update_auth_policy_server(self, ipAddress): if (end_time - start_time) >= self.max_timeout: self.log("Max timeout of {0} sec has reached for the execution id '{1}'. Exiting the loop due to " "unexpected API 'add_authentication_and_policy_server_access_configuration' status." - .format(self.max_timeout, task_id), "WARNING") + .format(self.max_timeout, task_id), "WARNING") break task_details = self.get_task_details(task_id) From 09a2241b9ef05d253c4f100a93dc5c03699e107e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Fri, 14 Jun 2024 13:04:48 +0530 Subject: [PATCH 024/119] Resolved the problem with the reservation of pool when passing the ipv6_address_space as false --- .../network_settings_workflow_manager.py | 29 +++++++++---------- 1 file changed, 13 insertions(+), 16 deletions(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 9cf3cc2a9e..761f99ced0 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -244,7 +244,6 @@ server_type: description: Server type for managing AAA for network devices. choices: [AAA, ISE] - default: ISE type: str protocol: description: Protocol for AAA or ISE server. @@ -272,7 +271,6 @@ shared_secret: description: - Shared secret for ISE Server. - - Required when the server_type is set to ISE. - Length of the shared secret should be atleast 4 characters. type: str type: dict @@ -283,7 +281,6 @@ description: - Server type for managing AAA for client and endpoints. choices: [AAA, ISE] - default: ISE type: str protocol: description: Protocol for AAA or ISE server. @@ -311,7 +308,6 @@ shared_secret: description: - Shared secret for ISE Server. - - Required when the server_type is set to ISE. - Length of the shared secret should be atleast 4 characters. type: str type: dict @@ -1812,12 +1808,6 @@ def get_want_reserve_pool(self, reserve_pool): else: del pool_values['ipv6Prefix'] - if not pool_values.get("ipv6AddressSpace"): - keys_to_check = ['ipv6PrefixLength', 'ipv6GateWay', 'ipv6DhcpServers', - 'ipv6DnsServers', 'ipv6TotalHost'] - for key in keys_to_check: - if pool_values.get(key) is None: - del pool_values[key] else: keys_to_delete = ['type', 'ipv4GlobalPool', 'ipv4Prefix', 'ipv4PrefixLength', 'ipv4TotalHost', 'ipv4Subnet', 'slaacSupport'] @@ -1830,6 +1820,13 @@ def get_want_reserve_pool(self, reserve_pool): if pool_values.get(item) is None: del pool_values[item] + if not pool_values.get("ipv6AddressSpace"): + keys_to_check = ['ipv6PrefixLength', 'ipv6GateWay', 'ipv6DhcpServers', + 'ipv6DnsServers', 'ipv6TotalHost', 'ipv6Subnet'] + for key in keys_to_check: + if key in pool_values: + del pool_values[key] + want_reserve.append(pool_values) reserve_pool_index += 1 @@ -1985,9 +1982,9 @@ def get_want_network(self, network_management_details): "servers": server_type }) else: - want_network_settings.get("network_aaa").update({ - "servers": "ISE" - }) + self.msg = "The 'server_type' is required under network_aaa." + self.status = "failed" + return self if server_type not in server_types: self.msg = "The 'server_type' in the network_aaa should be in {0}".format(server_types) @@ -2070,9 +2067,9 @@ def get_want_network(self, network_management_details): "servers": server_type }) else: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "servers": "ISE" - }) + self.msg = "The 'server_type' is required under client_and_endpoint_aaa." + self.status = "failed" + return self if server_type not in server_types: self.msg = "The 'server_type' in the client_and_endpoint_aaa should be in {0}".format(server_types) From 5e5381f43d0472f5b7b2b82b7c774e99d44692e4 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 14 Jun 2024 18:59:11 +0530 Subject: [PATCH 025/119] Fix the issue of configruing Syslog/SNMP/Webhook destinations when scaled up, also fix the issue of creating/updating syslog notification for scaled set up, handle the exception from status code 204 and return expected response --- ...ents_and_notifications_workflow_manager.py | 611 ++++++++---------- 1 file changed, 283 insertions(+), 328 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index a8cac092c6..d7a470c711 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1124,48 +1124,55 @@ def get_have(self, config): have = {} - if config.get('syslog_destination'): - syslog_destination = self.get_syslog_destination_in_ccc() + if config.get("syslog_destination"): + name = config.get("syslog_destination").get("name") + syslog_destination = self.get_syslog_destination_in_ccc(name) if syslog_destination: - have['syslog_destinations'] = syslog_destination + have["syslog_destinations"] = syslog_destination[0] - if config.get('snmp_destination'): - snmp_destinations = self.get_snmp_destination_in_ccc() + if config.get("snmp_destination"): + name = config.get("snmp_destination").get("name") + snmp_destinations = self.get_snmp_destination_in_ccc(name) if snmp_destinations: - have['snmp_destinations'] = snmp_destinations + have["snmp_destinations"] = snmp_destinations - if config.get('webhook_destination'): - webhook_destinations = self.get_webhook_destination_in_ccc() + if config.get("webhook_destination"): + name = config.get("webhook_destination").get("name") + webhook_destinations = self.get_webhook_destination_in_ccc(name) if webhook_destinations: - have['webhook_destinations'] = webhook_destinations + have["webhook_destinations"] = webhook_destinations - if config.get('email_destination'): + if config.get("email_destination"): email_destination = self.get_email_destination_in_ccc() if email_destination: - have['email_destination'] = email_destination + have["email_destination"] = email_destination - if config.get('itsm_setting'): - itsm_setting = self.get_itsm_settings_in_ccc() + if config.get("itsm_setting"): + name = config.get("itsm_setting").get("instance_name") + itsm_setting = self.get_itsm_settings_in_ccc(name) if itsm_setting: - have['itsm_setting'] = itsm_setting + have["itsm_setting"] = itsm_setting - if config.get('syslog_event_notification'): - syslog_subscription_notifications = self.get_syslog_notification_details() + if config.get("syslog_event_notification"): + name = config.get("syslog_event_notification").get("name") + syslog_subscription_notifications = self.get_syslog_notification_details(name) if syslog_subscription_notifications: - have['syslog_subscription_notifications'] = syslog_subscription_notifications + have["syslog_subscription_notifications"] = syslog_subscription_notifications - if config.get('webhook_event_notification'): - webhook_subscription_notifications = self.get_webhook_notification_details() + if config.get("webhook_event_notification"): + name = config.get("webhook_event_notification").get("name") + webhook_subscription_notifications = self.get_webhook_notification_details(name) if webhook_subscription_notifications: - have['webhook_subscription_notifications'] = webhook_subscription_notifications + have["webhook_subscription_notifications"] = webhook_subscription_notifications - if config.get('email_event_notification'): - email_subscription_notifications = self.get_email_notification_details() + if config.get("email_event_notification"): + name = config.get("email_event_notification").get("name") + email_subscription_notifications = self.get_email_notification_details(name) if email_subscription_notifications: - have['email_subscription_notifications'] = email_subscription_notifications + have["email_subscription_notifications"] = email_subscription_notifications self.have = have - self.log("Current State (have): {0}".format(str(self.have)), "INFO") + self.log("Current State (have): {0}".format(str(have)), "INFO") return self @@ -1216,13 +1223,15 @@ def get_want(self, config): return self - def get_syslog_destination_in_ccc(self): + def get_syslog_destination_in_ccc(self, name): """ Retrieve the details of syslog destinations present in Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the syslog destination to retrieve details for. Returns: - str: A string containing the details of syslog destinations present in Cisco Catalyst Center. + dict or None: A dictionary containing the details of syslog destination present in Cisco Catalyst Center. + If not present then it just return the None. Description: This function queries Cisco Catalyst Center to retrieve the details of syslog destinations. The response contains the status message indicating the syslog destinations present in Cisco Catalyst Center. @@ -1232,18 +1241,26 @@ def get_syslog_destination_in_ccc(self): try: response = self.dnac._exec( family="event_management", - function='get_syslog_destination' + function='get_syslog_destination', + op_modifies=True, + params={"name": name} ) self.log("Received API response from 'get_syslog_destination': {0}".format(str(response)), "DEBUG") response = response.get('statusMessage') if not response: - self.log("There is no Syslog destination present in Cisco Catalyst Center", "INFO") + self.log("There is no Syslog destination '{0}' present in Cisco Catalyst Center".format(name), "INFO") return response return response except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Syslog destination with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None self.status = "failed" self.msg = "Error while getting the details of Syslog destination present in Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "ERROR") @@ -1272,7 +1289,7 @@ def syslog_dest_needs_update(self, syslog_details, syslog_details_in_ccc): if syslog_details_in_ccc["host"] != value: update_needed = True break - elif str(syslog_details_in_ccc[key]) == value or value == "": + elif str(syslog_details_in_ccc[key]) == str(value) or value == "": continue else: update_needed = True @@ -1430,31 +1447,54 @@ def update_syslog_destination(self, syslog_details, syslog_details_in_ccc): return self - def get_snmp_destination_in_ccc(self): + def get_snmp_destination_in_ccc(self, name): """ Retrieve the details of SNMP destinations present in Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the syslog destination to retrieve details for. Returns: - dict: A dictionary containing the details of SNMP destinations present in Cisco Catalyst Center. + dict or None: A dictionary containing the details of SNMP destination present in Cisco Catalyst Center. + If not present then it just return the None. Description: This function queries Cisco Catalyst Center to retrieve the details of SNMP destinations. It utilizes the 'event_management' API endpoint with the 'get_snmp_destination' function. The response contains information about the SNMP destinations present in Cisco Catalyst Center. If no SNMP destinations are found, it returns an empty dictionary. """ - try: - response = self.dnac._exec( - family="event_management", - function='get_snmp_destination' - ) - self.log("Received API response from 'get_snmp_destination': {0}".format(str(response)), "DEBUG") - if not response: - self.log("There is no SNMP destination present in Cisco Catalyst Center", "INFO") - return response - - return response + try: + offset = 0 + limit = 10 + while True: + try: + response = self.dnac._exec( + family="event_management", + function='get_snmp_destination', + params={ + "offset": offset * limit, + "limit": limit + } + ) + offset = offset + 1 + self.log("Received API response from 'get_snmp_destination': {0}".format(str(response)), "DEBUG") + + if not response: + self.log("There is no SNMP destination with name '{0}' present in Cisco Catalyst Center".format(name), "INFO") + return response + + for destination in response: + if destination.get("name") == name: + self.log("SNMP Destination '{0}' present in Cisco Catalyst Center".format(name), "INFO") + return destination + time.sleep(1) + except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as SNMP destination with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None except Exception as e: self.status = "failed" @@ -1755,13 +1795,14 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): return self - def get_webhook_destination_in_ccc(self): + def get_webhook_destination_in_ccc(self, name): """ Retrieve details of Rest Webhook destinations present in Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the syslog destination to retrieve details for. Returns: - dict: A dictionary containing details of Rest Webhook destinations present in Cisco Catalyst Center, + dict: A dictionary containing details of Rest Webhook destination present in Cisco Catalyst Center, or None if no Rest Webhook destinations are found. Description: This function retrieves the details of Rest Webhook destinations present in Cisco Catalyst Center @@ -1770,18 +1811,38 @@ def get_webhook_destination_in_ccc(self): """ try: - response = self.dnac._exec( - family="event_management", - function='get_webhook_destination' - ) - self.log("Received API response from 'get_webhook_destination': {0}".format(str(response)), "DEBUG") - response = response.get('statusMessage') - - if not response: - self.log("There is no Rest Webhook destination present in Cisco Catalyst Center", "INFO") - return response - - return response + offset = 0 + limit = 10 + while True: + try: + response = self.dnac._exec( + family="event_management", + function='get_webhook_destination', + params={ + "offset": offset * limit, + "limit": limit + } + ) + offset = offset + 1 + self.log("Received API response from 'get_webhook_destination': {0}".format(str(response)), "DEBUG") + response = response.get('statusMessage') + + if not response: + self.log("There is no Rest Webhook destination present in Cisco Catalyst Center", "INFO") + return response + + for destination in response: + if destination.get("name") == name: + self.log("Webhook Destination '{0}' present in Cisco Catalyst Center".format(name), "INFO") + return destination + time.sleep(1) + except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Syslog destination with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None except Exception as e: self.status = "failed" @@ -2240,11 +2301,12 @@ def update_email_destination(self, email_details, email_dest_detail_in_ccc): return self - def get_itsm_settings_in_ccc(self): + def get_itsm_settings_in_ccc(self, name): """ Retrieves the ITSM Integration Settings present in Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The instance name of the ITSM Integration Setting to retrieve details for. Returns: dict: A dictionary containing the list of details of ITSM Integration Settings. Description: @@ -2258,7 +2320,9 @@ def get_itsm_settings_in_ccc(self): try: response = self.dnac._exec( family="itsm_integration", - function='get_all_itsm_integration_settings' + function='get_all_itsm_integration_settings', + op_modifies=True, + params={"name": name} ) self.log("Received API response from 'get_all_itsm_integration_settings': {0}".format(str(response)), "DEBUG") response = response.get('data') @@ -2534,8 +2598,9 @@ def update_itsm_integration_setting(self, itsm_params, itsm_in_ccc): if updated_date: self.status = "success" self.result['changed'] = True - self.msg = """ITSM Integration Settings with name '{0}' has been updated successfully in Cisco Catalyst - Center.""".format(update_itsm_params.get('name')) + self.msg = ( + "ITSM Integration Settings with name '{0}' has been updated successfully in Cisco Catalyst Center" + ).format(update_itsm_params.get('name')) self.log(self.msg, "INFO") self.result['response'] = self.msg return self @@ -2603,11 +2668,12 @@ def delete_itsm_integration_setting(self, itsm_name, itsm_id): return self - def get_syslog_notification_details(self): + def get_syslog_notification_details(self, name): """ Retrieves the details of a Syslog Event Notification subscription from the Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the Syslog Event Notification to retrieve details for. Returns: dict or None: A dictionary containing the details of the Syslog Event Notification subscription if found. Returns None if no subscription is found or if an error occurs during the API call. @@ -2621,16 +2687,24 @@ def get_syslog_notification_details(self): response = self.dnac._exec( family="event_management", function='get_syslog_event_subscriptions', + op_modifies=True, + params={"name": name} ) self.log("Received API response from 'get_syslog_event_subscriptions': {0}".format(str(response)), "DEBUG") if not response: - self.log("There is no Syslog Event Notification present in Cisco Catalyst Center.", "INFO") + self.log("There is no Syslog Event Notification with given name '{0}' present in Cisco Catalyst Center.".format(name), "INFO") return response return response except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Syslog Event Notification with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None self.status = "failed" self.msg = ( "An error occurred while retrieving Syslog Event subscription Notification details " @@ -2659,22 +2733,24 @@ def get_syslog_subscription_detail(self, destination): response = self.dnac._exec( family="event_management", function='get_syslog_subscription_details', + op_modifies=True, + params={"name": destination} ) self.log("Received API response from 'get_syslog_subscription_details': {0}".format(str(response)), "DEBUG") - sys_destination_details = [] if not response: - self.log("There is no Syslog destination present in Cisco Catalyst Center.", "INFO") - return sys_destination_details - - for dest in response: - if dest["name"] == destination: - return dest - self.log("Syslog destination with the name '{0}' not found in Cisco Catalyst Center.".format(destination), "INFO") + self.log("Syslog destination with the name '{0}' not found in Cisco Catalyst Center.".format(destination), "INFO") + return response - return sys_destination_details + return response[0] except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Syslog destination with given name '{0}' not present in Cisco Catalyst" + " Center.".format(destination), "WARNING" + ) + return None self.status = "failed" self.msg = ( "Error while getting the details of the Syslog Subscription with the given name '{0}'" @@ -3214,11 +3290,12 @@ def update_syslog_notification(self, syslog_notification_params, syslog_notifica return self - def get_webhook_notification_details(self): + def get_webhook_notification_details(self, name): """ Retrieves the details of a Webhook Event Notification subscription from the Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the Webhook Event Notification to retrieve details for. Returns: dict or None: A dictionary containing the details of the Webhook Event Notification subscription if found. Returns None if no subscription is found or if an error occurs during the API call. @@ -3232,16 +3309,24 @@ def get_webhook_notification_details(self): response = self.dnac._exec( family="event_management", function='get_rest_webhook_event_subscriptions', + op_modifies=True, + params={"name": name} ) self.log("Received API response from 'get_rest_webhook_event_subscriptions': {0}".format(str(response)), "DEBUG") if not response: - self.log("There is no Webhook Events Subscription Notification present in Cisco Catalyst Center.", "INFO") + self.log("There is no Webhook Event Notification with given name '{0}' present in Cisco Catalyst Center.".format(name), "INFO") return response return response except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Webhook Event Notification with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None self.status = "failed" self.log("Error while retrieving Webhook Event Notification details: {0}".format(str(e)), "ERROR") self.log(self.msg, "ERROR") @@ -3267,22 +3352,23 @@ def get_webhook_subscription_detail(self, destination): response = self.dnac._exec( family="event_management", function='get_rest_webhook_subscription_details', + op_modifies=True, + params={"name": destination} ) self.log("Received API response from 'get_rest_webhook_subscription_details': {0}".format(str(response)), "DEBUG") - web_destination_details = [] - if not response: - self.log("There is no webhook destination present in Cisco Catalyst Center.", "INFO") - return web_destination_details - - for dest in response: - if dest["name"] == destination: - return dest - self.log("There is no webhook destination with given name '{0}' present in Cisco Catalyst Center.".format(destination), "INFO") + self.log("Webhook destination with the name '{0}' not found in Cisco Catalyst Center.".format(destination), "INFO") + return response - return web_destination_details + return response[0] except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Webhook destination with given name '{0}' not present in Cisco Catalyst" + " Center.".format(destination), "WARNING" + ) + return None self.status = "failed" self.msg = """Error while getting the details of webhook Subscription with given name '{0}' present in Cisco Catalyst Center: {1}""".format(destination, str(e)) @@ -3630,11 +3716,12 @@ def update_webhook_notification(self, webhook_notification_params, webhook_notif return self - def get_email_notification_details(self): + def get_email_notification_details(self, name): """ - Retrieves the details of a email Event Notification subscription from the Cisco Catalyst Center. + Retrieves the details of a Email Event Notification subscription from the Cisco Catalyst Center. Args: self (object): An instance of a class used for interacting with Cisco Catalyst Center. + name (str): The name of the Email Event Notification to retrieve details for. Returns: dict or None: A dictionary containing the details of the email Event Notification subscription if found. Returns None if no subscription is found or if an error occurs during the API call. @@ -3648,16 +3735,24 @@ def get_email_notification_details(self): response = self.dnac._exec( family="event_management", function='get_email_event_subscriptions', + op_modifies=True, + params={"name": name} ) self.log("Received API response from 'get_email_event_subscriptions': {0}".format(str(response)), "DEBUG") if not response: - self.log("There is no Email Events Subscription Notification present in Cisco Catalyst Center.", "INFO") + self.log("There is no Email Event Notification with given name '{0}' present in Cisco Catalyst Center.".format(name), "INFO") return response return response + except Exception as e: - self.status = "failed" + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Email Event Notification with given name '{0}' not present in Cisco Catalyst" + " Center.".format(name), "WARNING" + ) + return None self.msg = "Exception occurred while retrieving Email Event Subscription Notification: {0}".format(str(e)) self.log(self.msg, "ERROR") self.check_return_status() @@ -3682,22 +3777,25 @@ def get_email_subscription_detail(self, instance): response = self.dnac._exec( family="event_management", function='get_email_subscription_details', + op_modifies=True, + params={"name": instance} ) self.log("Received API response from 'get_email_subscription_details': {0}".format(str(response)), "DEBUG") email_destination_details = None if not response: - self.log("There is no email destination present in Cisco Catalyst Center.", "INFO") - return email_destination_details - - for dest in response: - if dest["name"] == instance: - return dest - self.log("There is no email destination with given name '{0}' present in Cisco Catalyst Center.".format(instance), "INFO") + self.log("Email instance with given name '{0}' present in Cisco Catalyst Center.".format(instance), "INFO") + return response - return email_destination_details + return response[0] except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Email instance with given name '{0}' not present in Cisco Catalyst" + " Center.".format(instance), "WARNING" + ) + return None self.status = "failed" self.msg = """Error while getting the details of Email event Subscription with given destination name '{0}' present in Cisco Catalyst Center: {1}""".format(instance, str(e)) @@ -4234,22 +4332,8 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - is_destination_exist = False - for webhook_dict in self.have.get('webhook_destinations'): - if webhook_dict['name'] == destination: - webhook_dest_detail_in_ccc = webhook_dict - is_destination_exist = True - break webhook_params = self.collect_webhook_playbook_params(webhook_details) - - if webhook_params.get('method') not in ["POST", "PUT"]: - self.status = "failed" - self.msg = ( - "Invalid Webhook method name '{0}' for creating/updating Webhook destination in Cisco Catalyst Center." - "Select one of the following method 'POST/PUT'.".format(webhook_params.get('method')) - ) - self.log(self.msg, "ERROR") - return self + url = webhook_params.get('url') regex_pattern = re.compile( r'^https://' # Ensure the URL starts with "https://" @@ -4265,7 +4349,6 @@ def get_diff_merged(self, config): r'(\/[A-Za-z0-9._~:/?#[@!$&\'()*+,;=-]*)?' # Optional path r'$' # End of the string ) - url = webhook_params.get('url') # Check if the input string matches the pattern if url and not regex_pattern.match(url): @@ -4277,7 +4360,18 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - if not is_destination_exist: + if webhook_params.get('method') and webhook_params.get('method') not in ["POST", "PUT"]: + self.status = "failed" + self.msg = ( + "Invalid Webhook method name '{0}' for creating/updating Webhook destination in Cisco Catalyst Center." + "Select one of the following method 'POST/PUT'.".format(webhook_params.get('method')) + ) + self.log(self.msg, "ERROR") + return self + + webhook_dest_detail_in_ccc = self.have.get('webhook_destinations') + + if not self.have.get('webhook_destinations'): # Need to Add snmp destination in Cisco Catalyst Center with given playbook params if not url: self.status = "failed" @@ -4380,17 +4474,9 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - destinations_in_ccc = self.have.get('syslog_destinations') - is_destination_exist_in_ccc = False - - if destinations_in_ccc: - for destination in destinations_in_ccc: - if destination["name"] == name: - is_destination_exist_in_ccc = True - syslog_details_in_ccc = destination - break + syslog_details_in_ccc = self.have.get('syslog_destinations') - if not is_destination_exist_in_ccc: + if not syslog_details_in_ccc: # We need to Add the Syslog Destination in the Catalyst Center self.add_syslog_destination(syslog_details).check_return_status() else: @@ -4415,14 +4501,9 @@ def get_diff_merged(self, config): self.msg = "Name is required parameter for adding/updating SNMP destination for creating/updating the event." self.log(self.msg, "ERROR") return self - is_destination_exist = False - for snmp_dict in self.have.get('snmp_destinations'): - if snmp_dict['name'] == destination: - snmp_dest_detail_in_ccc = snmp_dict - is_destination_exist = True - break snmp_params = self.collect_snmp_playbook_params(snmp_details) + snmp_dest_detail_in_ccc = self.have.get('snmp_destinations') if snmp_params.get('port'): try: @@ -4446,7 +4527,7 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - if not is_destination_exist: + if not self.have.get("snmp_destinations"): # Need to Add snmp destination in Cisco Catalyst Center with given playbook params self.check_snmp_required_parameters(snmp_params).check_return_status() self.log("""Required parameter validated successfully for adding SNMP Destination with name '{0}' in Cisco @@ -4475,20 +4556,15 @@ def get_diff_merged(self, config): return self itsm_params = self.collect_itsm_playbook_params(itsm_details) - - is_itsm_exist = False itsm_detail_in_ccc = self.have.get('itsm_setting') + if not itsm_detail_in_ccc: self.log("There is no ITSM Intergartion setting present in Cisco Catalyst Center", "INFO") else: - # Check whether the given itsm integration present in Cisco Catalyst Center or not. - for itsm in itsm_detail_in_ccc: - if itsm['name'] == itsm_name: - itsm_id = itsm['id'] - is_itsm_exist = True - break - - if not is_itsm_exist: + # collect the ITSM id with given name + itsm_id = itsm_detail_in_ccc[0].get("id") + + if not itsm_detail_in_ccc: # Need to Add snmp destination in Cisco Catalyst Center with given playbook params invalid_itsm_params = [] invalid_itsm_params = self.check_required_itsm_param(itsm_params, invalid_itsm_params) @@ -4508,7 +4584,7 @@ def get_diff_merged(self, config): # Check whether the url exist or not and if exists is it valid url = connection_setting.get('Url') if not url and "Url" not in invalid_itsm_params: - invalid_itsm_params.append("URL") + invalid_itsm_params.append("url") if invalid_itsm_params: self.status = "failed" @@ -4564,23 +4640,15 @@ def get_diff_merged(self, config): return self webhook_notification_params = self.collect_webhook_notification_playbook_params(webhook_notification_details) - current_webhook_notifications = self.have.get("webhook_subscription_notifications") - is_webhook_notification_exist = False - if current_webhook_notifications: - for notification in current_webhook_notifications: - if notification["name"] == notification_name: - is_webhook_notification_exist = True - webhook_notification_in_ccc = notification - break - - if not is_webhook_notification_exist: + if not self.have.get("webhook_subscription_notifications"): # Need to create webhook event notification in Cisco Catalyst Center self.mandatory_webhook_notification_parameter_check(webhook_notification_params).check_return_status() self.log("""Successfully validated the required parameter for creating the Webhook Event Notification with given name '{0}'""".format(notification_name), "INFO") self.create_webhook_notification(webhook_notification_params).check_return_status() else: + webhook_notification_in_ccc = self.have.get("webhook_subscription_notifications")[0] # Check whether the webhook evenet notification needs any update or not. notification_update = self.webhook_notification_needs_update(webhook_notification_params, webhook_notification_in_ccc) if not notification_update: @@ -4607,23 +4675,15 @@ def get_diff_merged(self, config): return self email_notification_params = self.collect_email_notification_playbook_params(email_notification_details) - current_email_notifications = self.have.get("email_subscription_notifications") - is_email_notification_exist = False - - if current_email_notifications: - for notification in current_email_notifications: - if notification["name"] == notification_name: - is_email_notification_exist = True - email_notification_in_ccc = notification - break - if not is_email_notification_exist: + if not self.have.get("email_subscription_notifications"): # Need to create email event notification in Cisco Catalyst Center self.mandatory_email_notification_parameter_check(email_notification_params).check_return_status() self.log("""Successfully validated the required parameter for creating the email Event Notification with given name '{0}'""".format(notification_name), "INFO") self.create_email_notification(email_notification_params).check_return_status() else: + email_notification_in_ccc = self.have.get("email_subscription_notifications")[0] # Check whether the email evenet notification needs any update or not. notification_update = self.email_notification_needs_update(email_notification_params, email_notification_in_ccc) @@ -4651,23 +4711,15 @@ def get_diff_merged(self, config): return self syslog_notification_params = self.collect_syslog_notification_playbook_params(syslog_notification_details) - current_syslog_notifications = self.have.get("syslog_subscription_notifications") - is_syslog_notification_exist = False - if current_syslog_notifications: - for notification in current_syslog_notifications: - if notification["name"] == notification_name: - is_syslog_notification_exist = True - syslog_notification_in_ccc = notification - break - - if not is_syslog_notification_exist: + if not self.have.get("syslog_subscription_notifications"): # Need to create syslog event notification in Cisco Catalyst Center self.mandatory_syslog_notification_parameter_check(syslog_notification_params).check_return_status() self.log("""Successfully validated the required parameter for creating the Syslog Event Notification with given name '{0}'""".format(notification_name), "INFO") self.create_syslog_notification(syslog_notification_params).check_return_status() else: + syslog_notification_in_ccc = self.have.get("syslog_subscription_notifications")[0] # Check whether the syslog evenet notification needs any update or not. sys_notification_update = self.syslog_notification_needs_update(syslog_notification_params, syslog_notification_in_ccc) if not sys_notification_update: @@ -4734,7 +4786,8 @@ def get_diff_deleted(self, config): self.result['changed'] = False self.msg = """There is no ITSM Intergartion setting present in Cisco Catalyst Center so cannot delete the ITSM Integartion setting with name '{0}'""".format(itsm_name) - self.log(self.name, "INFO") + self.log(self.msg, "INFO") + self.result['response'] = self.msg return self # Check whether the given itsm integration present in Catalyst Center or not @@ -4756,23 +4809,19 @@ def get_diff_deleted(self, config): if config.get('webhook_event_notification'): webhook_notification_details = self.want.get('webhook_event_notification') webhook_notification_name = webhook_notification_details.get('name') - current_webhook_notifications = self.have.get("webhook_subscription_notifications") - webhook_notification_id = None - if not current_webhook_notifications: + if not self.have.get("webhook_subscription_notifications"): self.status = "success" self.result['changed'] = False self.msg = ( "There is no Webhook Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(webhook_notification_name) ) - self.log(self.name, "INFO") + self.log(self.msg, "INFO") + self.result['response'] = self.msg return self - for notification in current_webhook_notifications: - if notification["name"] == webhook_notification_name: - webhook_notification_id = notification["subscriptionId"] - break + webhook_notification_id = self.have.get("webhook_subscription_notifications")[0].get("subscriptionId") if webhook_notification_id: self.delete_events_subscription_notification(webhook_notification_id, webhook_notification_name).check_return_status() @@ -4789,23 +4838,19 @@ def get_diff_deleted(self, config): if config.get('email_event_notification'): email_notification_details = self.want.get('email_event_notification') email_notification_name = email_notification_details.get('name') - current_email_notifications = self.have.get("email_subscription_notifications") - email_notification_id = None - if not current_email_notifications: + if not self.have.get("email_subscription_notifications"): self.status = "success" self.result['changed'] = False self.msg = ( "There is no Email Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(email_notification_name) ) - self.log(self.name, "INFO") + self.log(self.msg, "INFO") + self.result['response'] = self.msg return self - for notification in current_email_notifications: - if notification["name"] == email_notification_name: - email_notification_id = notification["subscriptionId"] - break + email_notification_id = self.have.get("email_subscription_notifications").get("subscriptionId") if email_notification_id: self.delete_events_subscription_notification(email_notification_id, email_notification_name).check_return_status() @@ -4822,23 +4867,19 @@ def get_diff_deleted(self, config): if config.get('syslog_event_notification'): syslog_notification_details = self.want.get('syslog_event_notification') syslog_notification_name = syslog_notification_details.get('name') - current_syslog_notifications = self.have.get("syslog_subscription_notifications") - syslog_notification_id = None - if not current_syslog_notifications: + if not self.have.get("syslog_subscription_notifications"): self.status = "success" self.result['changed'] = False self.msg = ( "There is no Syslog Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(syslog_notification_name) ) - self.log(self.name, "INFO") + self.log(self.msg, "INFO") + self.result['response'] = self.msg return self - for notification in current_syslog_notifications: - if notification["name"] == syslog_notification_name: - syslog_notification_id = notification["subscriptionId"] - break + syslog_notification_id = self.have.get("syslog_subscription_notifications")[0].get("subscriptionId") if syslog_notification_id: self.delete_events_subscription_notification(syslog_notification_id, syslog_notification_name).check_return_status() @@ -4870,19 +4911,12 @@ def verify_diff_merged(self, config): self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") - if config.get('syslog_destination'): - syslog_details = self.want.get('syslog_details') - syslog_name = syslog_details.get('name') - destinations_in_ccc = self.have.get('syslog_destinations') - is_destination_exist_in_ccc = False + if config.get("syslog_destination"): + syslog_details = self.want.get("syslog_details") + syslog_name = syslog_details.get("name") + destinations_in_ccc = self.have.get("syslog_destinations") if destinations_in_ccc: - for destination in destinations_in_ccc: - if destination["name"] == syslog_name: - is_destination_exist_in_ccc = True - break - - if is_destination_exist_in_ccc: self.status = "success" msg = """Requested Syslog Destination '{0}' have been successfully added/updated to the Cisco Catalyst Center and their addition/updation has been verified.""".format(syslog_name) @@ -4891,17 +4925,11 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that the Syslog destination with name '{0}' addition/updation task may not have executed successfully.""".format(syslog_name), "INFO") - if config.get('snmp_destination'): - snmp_details = self.want.get('snmp_details') - snmp_dest_name = snmp_details.get('name') - is_snmp_dest_exist = False - - for snmp_dict in self.have.get('snmp_destinations'): - if snmp_dict['name'] == snmp_dest_name: - is_snmp_dest_exist = True - break + if config.get("snmp_destination"): + snmp_details = self.want.get("snmp_details") + snmp_dest_name = snmp_details.get("name") - if is_snmp_dest_exist: + if self.have.get("snmp_destinations"): self.status = "success" msg = """Requested SNMP Destination '{0}' have been successfully added/updated to the Cisco Catalyst Center and their addition/updation has been verified.""".format(snmp_dest_name) @@ -4910,16 +4938,11 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that the SNMP destination with name '{0}' addition/updation task may not have executed successfully.""".format(snmp_dest_name), "INFO") - if config.get('webhook_destination'): - webhook_details = self.want.get('webhook_details') - webhook_name = webhook_details.get('name') + if config.get("webhook_destination"): + webhook_details = self.want.get("webhook_details") + webhook_name = webhook_details.get("name") - is_webhook_dest_exist = False - for webhook_dict in self.have.get('webhook_destinations'): - if webhook_dict['name'] == webhook_name: - is_webhook_dest_exist = True - break - if is_webhook_dest_exist: + if self.have.get("webhook_destinations"): self.status = "success" msg = """Requested Rest Webhook Destination '{0}' have been successfully added/updated to the Cisco Catalyst Center and their addition/updation has been verified.""".format(webhook_name) @@ -4928,9 +4951,9 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Rest Webhook destination with name '{0}' addition/updation task may not have executed successfully.""".format(webhook_name), "INFO") - if config.get('email_destination'): + if config.get("email_destination"): - if self.have.get('email_destination'): + if self.have.get("email_destination"): self.status = "success" msg = """Requested Email Destination have been successfully configured to the Cisco Catalyst Center and their configuration has been verified.""" @@ -4939,22 +4962,12 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Email destination configuration task may not have executed successfully.""", "INFO") - if config.get('itsm_setting'): - itsm_details = self.want.get('itsm_details') - itsm_name = itsm_details.get('instance_name') - is_itsm_exist = False - itsm_detail_in_ccc = self.have.get('itsm_setting') - - if not itsm_detail_in_ccc: - self.log("There is no ITSM Intergartion setting present in Cisco Catalyst Center", "INFO") - else: - # Check whether the given itsm integration present in Cisco Catalyst Center or not. - for itsm in itsm_detail_in_ccc: - if itsm['name'] == itsm_name: - is_itsm_exist = True - break + if config.get("itsm_setting"): + itsm_details = self.want.get("itsm_details") + itsm_name = itsm_details.get("instance_name") + itsm_detail_in_ccc = self.have.get("itsm_setting") - if is_itsm_exist: + if itsm_detail_in_ccc: self.status = "success" msg = """Requested ITSM Integration setting '{0}' have been successfully added/updated to the Cisco Catalyst Center and their addition/updation has been verified.""".format(itsm_name) @@ -4963,19 +4976,11 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that ITSM Integration setting with name '{0}' addition/updation task may not have executed successfully.""".format(itsm_name), "INFO") - if config.get('webhook_event_notification'): - webhook_notification_details = self.want.get('webhook_event_notification') - web_notification_name = webhook_notification_details.get('name') - current_webhook_notifications = self.have.get("webhook_subscription_notifications") - is_webhook_notification_exist = False + if config.get("webhook_event_notification"): + webhook_notification_details = self.want.get("webhook_event_notification") + web_notification_name = webhook_notification_details.get("name") - if current_webhook_notifications: - for notification in current_webhook_notifications: - if notification["name"] == web_notification_name: - is_webhook_notification_exist = True - break - - if is_webhook_notification_exist: + if self.have.get("webhook_subscription_notifications"): self.status = "success" msg = """Requested Webhook Events Subscription Notification '{0}' have been successfully created/updated to the Cisco Catalyst Center and their creation/updation has been verified.""".format(web_notification_name) @@ -4984,19 +4989,11 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Webhook Event Subscription Notification with name '{0}' creation/updation task may not have executed successfully.""".format(web_notification_name), "INFO") - if config.get('email_event_notification'): - email_notification_details = self.want.get('email_event_notification') - email_notification_name = email_notification_details.get('name') - current_email_notifications = self.have.get("email_subscription_notifications") - is_email_notification_exist = False - - if current_email_notifications: - for notification in current_email_notifications: - if notification["name"] == email_notification_name: - is_email_notification_exist = True - break + if config.get("email_event_notification"): + email_notification_details = self.want.get("email_event_notification") + email_notification_name = email_notification_details.get("name") - if is_email_notification_exist: + if self.have.get("email_subscription_notifications"): self.status = "success" msg = """Requested Email Events Subscription Notification '{0}' have been successfully created/updated to the Cisco Catalyst Center and their creation/updation has been verified.""".format(email_notification_name) @@ -5005,19 +5002,11 @@ def verify_diff_merged(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Email Event Subscription Notification with name '{0}' creation/updation task may not have executed successfully.""".format(email_notification_name), "INFO") - if config.get('syslog_event_notification'): - syslog_notification_details = self.want.get('syslog_event_notification') - syslog_notification_name = syslog_notification_details.get('name') - current_syslog_notifications = self.have.get("syslog_subscription_notifications") - is_syslog_notification_exist = False - - if current_syslog_notifications: - for notification in current_syslog_notifications: - if notification["name"] == syslog_notification_name: - is_syslog_notification_exist = True - break + if config.get("syslog_event_notification"): + syslog_notification_details = self.want.get("syslog_event_notification") + syslog_notification_name = syslog_notification_details.get("name") - if is_syslog_notification_exist: + if self.have.get("syslog_subscription_notifications"): self.status = "success" msg = """Requested Syslog Events Subscription Notification '{0}' have been successfully created/updated to the Cisco Catalyst Center and their creation/updation has been verified.""".format(syslog_notification_name) @@ -5045,22 +5034,12 @@ def verify_diff_deleted(self, config): self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") - if config.get('itsm_setting'): - itsm_details = self.want.get('itsm_details') - itsm_name = itsm_details.get('instance_name') - itsm_detail_in_ccc = self.have.get('itsm_setting') - itsm_deleted = True + if config.get("itsm_setting"): + itsm_details = self.want.get("itsm_details") + itsm_name = itsm_details.get("instance_name") + itsm_detail_in_ccc = self.have.get("itsm_setting") - # Check whether the given itsm integration present in Catalyst Center or not if not itsm_detail_in_ccc: - itsm_deleted = True - else: - for itsm in itsm_detail_in_ccc: - if itsm['name'] == itsm_name: - itsm_deleted = False - break - - if itsm_deleted: self.status = "success" msg = """Requested ITSM Integration setting '{0}' have been successfully deleted from the Cisco Catalyst Center and their deletion has been verified.""".format(itsm_name) @@ -5069,19 +5048,11 @@ def verify_diff_deleted(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that ITSM Integration setting with name '{0}' deletion task may not have executed successfully.""".format(itsm_name), "INFO") - if config.get('webhook_event_notification'): - webhook_notification_details = self.want.get('webhook_event_notification') - web_notification_name = webhook_notification_details.get('name') - current_webhook_notifications = self.have.get("webhook_subscription_notifications") - is_webhook_notification_deleted = True - - if current_webhook_notifications: - for notification in current_webhook_notifications: - if notification["name"] == web_notification_name: - is_webhook_notification_deleted = False - break + if config.get("webhook_event_notification"): + webhook_notification_details = self.want.get("webhook_event_notification") + web_notification_name = webhook_notification_details.get("name") - if is_webhook_notification_deleted: + if not self.have.get("webhook_subscription_notifications"): self.status = "success" msg = """Requested Webhook Events Subscription Notification '{0}' have been successfully deleted from the Cisco Catalyst Center and their deletion has been verified.""".format(web_notification_name) @@ -5090,19 +5061,11 @@ def verify_diff_deleted(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Webhook Events Subscription Notification with name '{0}' deletion task may not have executed successfully.""".format(web_notification_name), "INFO") - if config.get('email_event_notification'): - email_notification_details = self.want.get('email_event_notification') - email_notification_name = email_notification_details.get('name') - current_email_notifications = self.have.get("email_subscription_notifications") - is_email_notification_deleted = True - - if current_email_notifications: - for notification in current_email_notifications: - if notification["name"] == email_notification_name: - is_email_notification_deleted = False - break + if config.get("email_event_notification"): + email_notification_details = self.want.get("email_event_notification") + email_notification_name = email_notification_details.get("name") - if is_email_notification_deleted: + if not self.have.get("email_subscription_notifications"): self.status = "success" msg = """Requested Email Events Subscription Notification '{0}' have been successfully deleted from the Cisco Catalyst Center and their deletion has been verified.""".format(email_notification_name) @@ -5111,19 +5074,11 @@ def verify_diff_deleted(self, config): self.log("""Playbook's input does not match with Cisco Catalyst Center, indicating that Email Events Subscription Notification with name '{0}' deletion task may not have executed successfully.""".format(email_notification_name), "INFO") - if config.get('syslog_event_notification'): - syslog_notification_details = self.want.get('syslog_event_notification') - syslog_notification_name = syslog_notification_details.get('name') - current_syslog_notifications = self.have.get("syslog_subscription_notifications") - is_syslog_notification_deleted = True - - if current_syslog_notifications: - for notification in current_syslog_notifications: - if notification["name"] == syslog_notification_name: - is_syslog_notification_deleted = False - break + if config.get("syslog_event_notification"): + syslog_notification_details = self.want.get("syslog_event_notification") + syslog_notification_name = syslog_notification_details.get("name") - if is_syslog_notification_deleted: + if not self.have.get("syslog_subscription_notifications"): self.status = "success" msg = """Requested Syslog Events Subscription Notification '{0}' have been successfully deleted from the Cisco Catalyst Center and their deletion has been verified.""".format(syslog_notification_name) From 7f3d77674fdb2f285c4bc0065e5e8ee0c25a50e2 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 14 Jun 2024 20:32:16 +0530 Subject: [PATCH 026/119] address review comment --- plugins/modules/events_and_notifications_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index b5ac412728..392c12a28c 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -4363,7 +4363,7 @@ def get_diff_merged(self, config): if webhook_params.get('method') and webhook_params.get('method') not in ["POST", "PUT"]: self.status = "failed" self.msg = ( - "Invalid Webhook method name '{0}' for creating/updating Webhook destination in Cisco Catalyst Center." + "Invalid Webhook method name '{0}' for creating/updating Webhook destination in Cisco Catalyst Center. " "Select one of the following method 'POST/PUT'.".format(webhook_params.get('method')) ) self.log(self.msg, "ERROR") From ca9fb8007d837e65b4d851399bfe280b916494d5 Mon Sep 17 00:00:00 2001 From: sledzikowy <48012758+sledzikowy@users.noreply.github.com> Date: Mon, 17 Jun 2024 12:55:12 +0200 Subject: [PATCH 027/119] Addjust circleci config and add integration tests (#285) * Adjust CircleCI config to work with Madhan repository * Add integration tests --------- --- .circleci/config.yml | 33 +- test-requirements.txt | 7 + .../defaults/main.yml | 2 + .../meta/main.yml | 1 + .../tasks/main.yml | 34 ++ .../tests/test_assign_credentials.yml | 188 +++++++ .../test_device_credential_management.yml | 125 +++++ .../vars/vars_assign_credentials.yml | 61 +++ .../vars/vars_credential_management.yml | 102 ++++ .../defaults/main.yml | 2 + .../ccc_discovery_management/meta/main.yml | 1 + .../ccc_discovery_management/tasks/main.yml | 34 ++ .../tests/test_discovery_management.yml | 286 ++++++++++ .../vars/vars_discovery_management.yml | 164 ++++++ .../vars/vars_misc.yml | 14 + .../defaults/main.yml | 2 + .../ccc_inventory_management/meta/main.yml | 1 + .../ccc_inventory_management/tasks/main.yml | 34 ++ .../tests/test_inventory_management.yml | 492 ++++++++++++++++++ .../vars/vars_inventory_management.yml | 268 ++++++++++ .../defaults/main.yml | 2 + .../meta/main.yml | 1 + .../tasks/main.yml | 34 ++ .../test_network_compliance_management.yml | 88 ++++ .../vars_network_compliance_management.yml | 31 ++ .../ccc_pnp_management/defaults/main.yml | 2 + .../ccc_pnp_management/meta/main.yml | 1 + .../ccc_pnp_management/tasks/main.yml | 34 ++ .../tests/test_pnp_management.yml | 226 ++++++++ .../vars/vars_pnp_management.yml | 56 ++ .../ccc_site_management/defaults/main.yml | 2 + .../ccc_site_management/meta/main.yml | 1 + .../ccc_site_management/tasks/main.yml | 34 ++ .../tests/test_site_management.yml | 121 +++++ .../vars/vars_site_management.yml | 461 ++++++++++++++++ .../ccc_swim_management/defaults/main.yml | 2 + .../ccc_swim_management/meta/main.yml | 1 + .../ccc_swim_management/tasks/main.yml | 34 ++ .../tests/test_swim_management.yml | 313 +++++++++++ .../vars/vars_swim_management.yml | 124 +++++ 40 files changed, 3399 insertions(+), 20 deletions(-) create mode 100644 test-requirements.txt create mode 100644 tests/integration/ccc_device_credential_management/defaults/main.yml create mode 100644 tests/integration/ccc_device_credential_management/meta/main.yml create mode 100644 tests/integration/ccc_device_credential_management/tasks/main.yml create mode 100644 tests/integration/ccc_device_credential_management/tests/test_assign_credentials.yml create mode 100644 tests/integration/ccc_device_credential_management/tests/test_device_credential_management.yml create mode 100644 tests/integration/ccc_device_credential_management/vars/vars_assign_credentials.yml create mode 100644 tests/integration/ccc_device_credential_management/vars/vars_credential_management.yml create mode 100644 tests/integration/ccc_discovery_management/defaults/main.yml create mode 100644 tests/integration/ccc_discovery_management/meta/main.yml create mode 100644 tests/integration/ccc_discovery_management/tasks/main.yml create mode 100644 tests/integration/ccc_discovery_management/tests/test_discovery_management.yml create mode 100644 tests/integration/ccc_discovery_management/vars/vars_discovery_management.yml create mode 100644 tests/integration/ccc_discovery_management/vars/vars_misc.yml create mode 100644 tests/integration/ccc_inventory_management/defaults/main.yml create mode 100644 tests/integration/ccc_inventory_management/meta/main.yml create mode 100644 tests/integration/ccc_inventory_management/tasks/main.yml create mode 100644 tests/integration/ccc_inventory_management/tests/test_inventory_management.yml create mode 100644 tests/integration/ccc_inventory_management/vars/vars_inventory_management.yml create mode 100644 tests/integration/ccc_network_compliance_management/defaults/main.yml create mode 100644 tests/integration/ccc_network_compliance_management/meta/main.yml create mode 100644 tests/integration/ccc_network_compliance_management/tasks/main.yml create mode 100644 tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml create mode 100644 tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml create mode 100644 tests/integration/ccc_pnp_management/defaults/main.yml create mode 100644 tests/integration/ccc_pnp_management/meta/main.yml create mode 100644 tests/integration/ccc_pnp_management/tasks/main.yml create mode 100644 tests/integration/ccc_pnp_management/tests/test_pnp_management.yml create mode 100644 tests/integration/ccc_pnp_management/vars/vars_pnp_management.yml create mode 100644 tests/integration/ccc_site_management/defaults/main.yml create mode 100644 tests/integration/ccc_site_management/meta/main.yml create mode 100644 tests/integration/ccc_site_management/tasks/main.yml create mode 100644 tests/integration/ccc_site_management/tests/test_site_management.yml create mode 100644 tests/integration/ccc_site_management/vars/vars_site_management.yml create mode 100644 tests/integration/ccc_swim_management/defaults/main.yml create mode 100644 tests/integration/ccc_swim_management/meta/main.yml create mode 100644 tests/integration/ccc_swim_management/tasks/main.yml create mode 100644 tests/integration/ccc_swim_management/tests/test_swim_management.yml create mode 100644 tests/integration/ccc_swim_management/vars/vars_swim_management.yml diff --git a/.circleci/config.yml b/.circleci/config.yml index c67aeb70fb..e6f838c437 100644 --- a/.circleci/config.yml +++ b/.circleci/config.yml @@ -45,11 +45,7 @@ jobs: #machine: true docker: - image: python:3.8.10 - resource_class: rukapse/dnacenter-ansible-minikube - - environment: - CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> - CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + resource_class: madhansansel/dnacenter-ansible steps: - run: @@ -69,11 +65,7 @@ jobs: #machine: true docker: - image: python:3.8.10 - resource_class: rukapse/dnacenter-ansible-minikube - environment: - REPO_URL: << pipeline.trigger_parameters.github_app.repo_url >> - CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> - CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + resource_class: madhansansel/dnacenter-ansible steps: - run: name: Debug information @@ -93,7 +85,10 @@ jobs: fi - run: name: Clone repo to workspace - command: git clone --depth=1 -b $CIRCLE_PROJECT_BRANCHNAME $REPO_URL . + command: | + git clone --depth=1 https://github.com/$CIRCLE_PROJECT_USERNAME/$CIRCLE_PROJECT_REPONAME.git . + git fetch origin $CIRCLE_BRANCH:work + git checkout work - restore_cache: keys: @@ -119,7 +114,7 @@ jobs: #machine: true docker: - image: python:3.8.10 - resource_class: rukapse/dnacenter-ansible-minikube + resource_class: madhansansel/dnacenter-ansible steps: - run: @@ -199,12 +194,7 @@ jobs: #machine: true docker: - image: python:3.8.10 - resource_class: rukapse/dnacenter-ansible-minikube - - environment: - REPO_URL: << pipeline.trigger_parameters.github_app.repo_url >> - CIRCLE_PROJECT_REPONAME: << pipeline.trigger_parameters.github_app.repo_name >> - CIRCLE_PROJECT_BRANCHNAME: << pipeline.trigger_parameters.github_app.branch >> + resource_class: madhansansel/dnacenter-ansible steps: - run: @@ -216,7 +206,10 @@ jobs: - run: name: Clone repo to workspace - command: git clone --depth=1 -b $CIRCLE_PROJECT_BRANCHNAME $REPO_URL . + command: | + git clone --depth=1 https://github.com/$CIRCLE_PROJECT_USERNAME/$CIRCLE_PROJECT_REPONAME.git . + git fetch origin $CIRCLE_BRANCH:work + git checkout work - attach_workspace: at: roles-file @@ -261,7 +254,7 @@ jobs: #machine: true docker: - image: python:3.8.10 - resource_class: rukapse/dnacenter-ansible-minikube + resource_class: madhansansel/dnacenter-ansible steps: - when: diff --git a/test-requirements.txt b/test-requirements.txt new file mode 100644 index 0000000000..22f9023e0a --- /dev/null +++ b/test-requirements.txt @@ -0,0 +1,7 @@ +dnacentersdk >= 2.6.0 +Jinja2==3.1.4 +PyYAML==6.0.1 +cryptography==42.0.7 +paramiko==3.4.0 +pyzipper==0.3.6 +ansible==6.7.0 \ No newline at end of file diff --git a/tests/integration/ccc_device_credential_management/defaults/main.yml b/tests/integration/ccc_device_credential_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_device_credential_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_device_credential_management/meta/main.yml b/tests/integration/ccc_device_credential_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_device_credential_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_device_credential_management/tasks/main.yml b/tests/integration/ccc_device_credential_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_device_credential_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_device_credential_management/tests/test_assign_credentials.yml b/tests/integration/ccc_device_credential_management/tests/test_assign_credentials.yml new file mode 100644 index 0000000000..6b9e8c9595 --- /dev/null +++ b/tests/integration/ccc_device_credential_management/tests/test_assign_credentials.yml @@ -0,0 +1,188 @@ +--- +- debug: msg="Starting device credential assign management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_assign_credentials.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: true + + # - debug: + # msg: "{{ vars_map.credentials_details }}" + # - debug: + # msg: "{{ vars_map.design_sites }}" + +############################################# +# Pre Tests Clean Up # +############################################# + + - name: Clean up site before test + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.design_sites }}" + + - name: Clean up device credentials before test + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + +############################################# +# CREATE SITE # +############################################# + + - name: Create sites from design_sites config + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + register: result_create_site + loop: "{{ vars_map.design_sites }}" + tags: merged + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_create_site.results }}" + # when: result_create_site is defined + + - name: Assert area creation success for each site + assert: + that: + - item.changed == true + - "'created successfully' in item.msg" + loop: "{{ result_create_site.results }}" + when: result_create_site is defined + +############################################# +# Create Credentials # +############################################# + + - name: Create Credentials + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + tags: merged + register: result_create_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_create_credentials.results }}" + # when: result_create_credentials is defined + + - name: Assert Device Credential Creation + assert: + that: + - item.changed == true + - "'Created Successfully' in item.response[0].globalCredential.Creation.msg" + - item.response[0].globalCredential.Validation == "Success" + loop: "{{ result_create_credentials.results }}" + when: result_create_credentials is defined + +############################################# +# Assign Credentials to site # +############################################# + + # - name: Assign Credentials to sites + # cisco.dnac.device_credential_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # with_list: "{{ vars_map.credentials_assign }}" + # tags: assign + # register: result_assign_credentials + + # # - name: Debug item + # # debug: + # # var: item + # # loop: "{{ result_assign_credentials.results }}" + # # when: result_assign_credentials is defined + + # - name: Assert assign Credentials to sites + # assert: + # that: + # - item.changed == true + # - "'Device Credential Assigned to a site is Successfully' in item.response[0].assignCredential['Assign Credentials'].msg" + # loop: "{{ result_assign_credentials.results }}" + # when: result_assign_credentials is defined + +############################################# +# DELETE SITE # +############################################# + + - name: Delete site from design_sites config + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + register: result_delete_site + loop: "{{ vars_map.design_sites }}" + tags: deleted + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_delete_site.results }}" + # when: result_delete_site is defined + + - name: Assert deletion of area success for each site + assert: + that: + - item.changed == true + - "'deleted successfully' in item.response" + loop: "{{ result_delete_site.results }}" + when: result_delete_site is defined + +############################################# +# Delete Credentials # +############################################# + + - name: Delete Credentials + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + tags: deleted + register: result_delete_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_delete_credentials.results }}" + # when: result_delete_credentials is defined + + - name: Assert Global Credential Deletion + assert: + that: + - item.changed == true + - "'Deleted Successfully' in item.response[0].globalCredential.Deletion.msg" + - item.response[0].globalCredential.Validation == "Success" + loop: "{{ result_delete_credentials.results }}" + when: result_delete_credentials is defined diff --git a/tests/integration/ccc_device_credential_management/tests/test_device_credential_management.yml b/tests/integration/ccc_device_credential_management/tests/test_device_credential_management.yml new file mode 100644 index 0000000000..f4f9af6f3e --- /dev/null +++ b/tests/integration/ccc_device_credential_management/tests/test_device_credential_management.yml @@ -0,0 +1,125 @@ +--- +- debug: msg="Starting device credential management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_credential_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: true + + # - debug: + # msg: "{{ vars_map.credentials_details }}" + # - debug: + # msg: "{{ vars_map.credentials_update }}" + +############################################# +# Pre Tests Clean Up # +############################################# + + - name: Clean up device credentials before test + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + +############################################# +# Create Credentials # +############################################# + + - name: Create Credentials + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + tags: merged + register: result_create_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_create_credentials.results }}" + # when: result_create_credentials is defined + + - name: Assert Device Credential Creation + assert: + that: + - item.changed == true + - "'Created Successfully' in item.response[0].globalCredential.Creation.msg" + - item.response[0].globalCredential.Validation == "Success" + loop: "{{ result_create_credentials.results }}" + when: result_create_credentials is defined + +############################################# +# Update Credentials # +############################################# + + - name: Update Credentials + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_update }}" + tags: update + register: result_update_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_update_credentials.results }}" + # when: result_update_credentials is defined + + - name: Assert Device Credential Update + assert: + that: + - item.changed == true + - "'Updated Successfully' in item.response[0].globalCredential.Updation.msg" + - item.response[0].globalCredential.Validation == "Success" + loop: "{{ result_update_credentials.results }}" + when: result_update_credentials is defined + +############################################# +# Delete Credentials # +############################################# + + - name: Delete Credentials + cisco.dnac.device_credential_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + with_list: "{{ vars_map.credentials_details }}" + tags: deleted + register: result_delete_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_delete_credentials.results }}" + # when: result_delete_credentials is defined + + - name: Assert Device Credential Deletion + assert: + that: + - item.changed == true + - "'Deleted Successfully' in item.response[0].globalCredential.Deletion.msg" + - item.response[0].globalCredential.Validation == "Success" + loop: "{{ result_delete_credentials.results }}" + when: result_delete_credentials is defined diff --git a/tests/integration/ccc_device_credential_management/vars/vars_assign_credentials.yml b/tests/integration/ccc_device_credential_management/vars/vars_assign_credentials.yml new file mode 100644 index 0000000000..2f65fc03df --- /dev/null +++ b/tests/integration/ccc_device_credential_management/vars/vars_assign_credentials.yml @@ -0,0 +1,61 @@ +--- +design_sites: + - site: + area: + name: TEST_SITE_DEVICE_CREDENTIALS + parent_name: 'Global' + site_type: area + + +credentials_details: + - global_credential_details: + cli_credential: + - description: CLIAssign + username: cli-A + password: "5!meh" + enable_password: "q4^t^" + snmp_v2c_read: + - description: SNMPv2cRead Test Assign + read_community: "j5aj#0z%" + snmp_v2c_write: + - description: SNMPv2cWrite Test Assign + write_community: "n2!y9k38" + snmp_v3: + - description: SNMPv3 Test Assign + auth_password: "hp!x6px&#@2xi5" + auth_type: SHA + snmp_mode: AUTHPRIV + privacy_password: "ai7tpci3j@*j5g" + privacy_type: AES128 + username: admin + https_read: + - description: httpsRead Test Assign + username: admin + password: "2!x85yvqz*7" + port: 443 + https_write: + - description: httpsWrite Test Assign + username: admin + password: "j@5wgm%s5g%" + port: 443 + + +credentials_assign: + - assign_credentials_to_site: # Assign device credentials to sites + cli_credential: + description: CLIAssign + username: cli-A + snmp_v2c_read: + description: SNMPv2cRead Test Assign + snmp_v2c_write: + description: SNMPv2cWrite Test Assign + snmp_v3: + description: SNMPv3 Test Assign + https_read: + username: admin + description: httpsRead Test Assign + https_write: + username: admin + description: httpsWrite Test Assign + site_name: + - "Global/TEST_SITE_DEVICE_CREDENTIALS" diff --git a/tests/integration/ccc_device_credential_management/vars/vars_credential_management.yml b/tests/integration/ccc_device_credential_management/vars/vars_credential_management.yml new file mode 100644 index 0000000000..cd51dd1a85 --- /dev/null +++ b/tests/integration/ccc_device_credential_management/vars/vars_credential_management.yml @@ -0,0 +1,102 @@ +--- +credentials_details: #Create multiple credentials for the same protocol + - global_credential_details: + cli_credential: + - description: CLI1 + username: cli-1 + password: "5!meh" + enable_password: "q4^t^" + - description: CLI2 + username: cli-2 + password: "sbs2@" + enable_password: "8b!rn" + - description: CLI3 + username: cli-3 + password: "9%2&g" + enable_password: "9%%4b" + snmp_v2c_read: + - description: SNMPv2cRead Test 1 + read_community: "j5aj#8z%" + - description: SNMPv2cRead Test 2 + read_community: "m!ivyd%4" + - description: SNMPv2cRead Test 3 + read_community: "8hzx4$xw" + snmp_v2c_write: + - description: SNMPv2cWrite Test 1 + write_community: "n2@k8k38" + - description: SNMPv2cWrite Test 2 + write_community: "@&*46me5" + - description: SNMPv2cWrite Test 3 + write_community: "q@s$hl2!" + snmp_v3: + - description: SNMPv3 Test 1 + auth_password: "hp!x6px&#@2xi5" + auth_type: SHA + snmp_mode: AUTHPRIV + privacy_password: "ai7tpci3j@*j5g" + privacy_type: AES128 + username: admin + - description: SNMPv3 Test 2 + auth_password: "pnf$b73g**@j99" + auth_type: SHA + snmp_mode: AUTHPRIV + privacy_password: "gadcr!w!up7" + privacy_type: AES128 + username: admin + - description: SNMPv3 Test 3 + auth_password: "fgn8v#rj#y6" + auth_type: SHA + snmp_mode: AUTHPRIV + privacy_password: "q#nk^u$oy58" + privacy_type: AES128 + username: admin + https_read: + - description: httpsRead Test 1 + username: admin + password: "2!x89yvzz*7" + port: 443 + - description: httpsRead Test 2 + username: admin + password: "67q!bsnm*#o" + port: 443 + - description: httpsRead Test 3 + username: admin + password: "97w!fwy85#b" + port: 443 + https_write: + - description: httpsWrite Test 1 + username: admin + password: "j@8wgm%s2z%" + port: 443 + +credentials_update: + - global_credential_details: + cli_credential: + - description: CLI1 + username: cli-1 + password: "r*55*z8d2%6" + enable_password: "3^p@9*84nen" + snmp_v2c_read: + - description: SNMPv2cRead Test 1 + read_community: "mwn&k&$g%8g" + snmpV2cWrite: + - description: SNMPv2cWrite Test 1 + write_community: "n&9c3csirhu" + snmpV3: + - description: SNMPv3 Test 1 + auth_password: "j$4@2%2wgrv6f3z" + auth_type: SHA + snmp_mode: AUTHNOPRIV + privacy_password: "muqzks@3y$fco#w" + privacy_type: AES192 + username: admin + https_read: + - description: httpsRead Test 1 + username: admin + password: "2xg%iqt&fu@d6mh" + port: 443 + https_write: + - description: httpsWrite Test 1 + username: admin + password: "*#s&n2r9x$s@i8@" + port: 443 diff --git a/tests/integration/ccc_discovery_management/defaults/main.yml b/tests/integration/ccc_discovery_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_discovery_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_discovery_management/meta/main.yml b/tests/integration/ccc_discovery_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_discovery_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_discovery_management/tasks/main.yml b/tests/integration/ccc_discovery_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_discovery_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_discovery_management/tests/test_discovery_management.yml b/tests/integration/ccc_discovery_management/tests/test_discovery_management.yml new file mode 100644 index 0000000000..4d7d8ecabc --- /dev/null +++ b/tests/integration/ccc_discovery_management/tests/test_discovery_management.yml @@ -0,0 +1,286 @@ +--- +- debug: msg="Starting discovery management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_discovery_management.yml" + name: vars_map + + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: True + + - name: Clean up vars + include_vars: + file: "{{ role_path }}/vars/vars_misc.yml" + name: vars_map_delete + + # - debug: + # msg: "{{ vars_map.single_ip }}" + # - debug: + # msg: "{{ vars_map.ip_range }}" + # - debug: + # msg: "{{ vars_map.multi_range }}" + # - debug: + # msg: "{{ vars_map.cdp }}" + # - debug: + # msg: "{{ vars_map.lldp }}" + # - debug: + # msg: "{{ vars_map.cidr }}" + +############################################# +# Pre Tests Clean Up # +############################################# + + - name: Delete discoveries before test + cisco.dnac.discovery_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map_delete.delete_discoveries }}" + +############################################# +# Create Single IP Address Discovery # +############################################# + + # - name: Discover a single IP Address + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.single_ip }}" + # register: result_singleip_discovery + + # # - name: Debug item + # # debug: + # # var: result_singleip_discovery + + # - name: Check single IP discovery creation + # assert: + # that: + # - result_singleip_discovery.changed == true + # - "'Discovery Created Successfully' in result_singleip_discovery.results | map(attribute='msg') | list" + # when: result_singleip_discovery is defined + +############################################# +# Create Range IP Address Discovery # +############################################# + + # - name: Discover an IP Address Range + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.ip_range }}" + # register: result_ip_range_discovery + + # # - name: Debug item + # # debug: + # # var: result_ip_range_discovery + + # - name: Check IP address range discovery creation + # assert: + # that: + # - result_ip_range_discovery.changed == true + # - "'Discovery Created Successfully' in result_ip_range_discovery.results | map(attribute='msg') | list" + # when: result_ip_range_discovery is defined + +############################################# +# Create Multi Range IP Address Discovery # +############################################# + + # - name: Discover Multi IP Address Ranges + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.multi_range }}" + # register: result_multi_range_discovery + + # - name: Debug item + # debug: + # var: result_multi_range_discovery + + # - name: Check multi range IP address discovery creation + # assert: + # that: + # - result_multi_range_discovery.changed == true + # - "'Discovery Created Successfully' in result_multi_range_discovery.results | map(attribute='msg') | list" + # when: result_multi_range_discovery is defined + +############################################# +# Create Discovery using CDP # +############################################# + + # - name: Discover using CDP + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.cdp }}" + # register: result_cdp_discovery + + # # - name: Debug item + # # debug: + # # var: result_cdp_discovery + + # - name: Check CDP discovery creation + # assert: + # that: + # - result_cdp_discovery.changed == true + # - "'Discovery Created Successfully' in result_cdp_discovery.results | map(attribute='msg') | list" + # when: result_cdp_discovery is defined + +############################################# +# Create Discovery using LLDP # +############################################# + + # - name: Discover using LLDP + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.lldp }}" + # register: result_lldp_discovery + + # # - name: Debug item + # # debug: + # # var: result_lldp_discovery + + # - name: Check LLDP discovery creation + # assert: + # that: + # - result_lldp_discovery.changed == true + # - "'Discovery Created Successfully' in result_lldp_discovery.results | map(attribute='msg') | list" + # when: result_lldp_discovery is defined + +############################################# +# Create Discovery using CIDR # +############################################# + + # - name: Discover using CIDR + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.cidr }}" + # register: result_cidr_discovery + + # # - name: Debug item + # # debug: + # # var: result_cidr_discovery + + # - name: Check CIDR discovery creation + # assert: + # that: + # - result_cidr_discovery.changed == true + # - "'Discovery Created Successfully' in result_cidr_discovery.results | map(attribute='msg') | list" + # when: result_cidr_discovery is defined + +############################################# +# Create Multiple Discoveries # +############################################# + + # - name: Add new item with "preferred_mgmt_ip_method" + # set_fact: + # vars_map_preferred_mgmt: {} + + # - name: Add preferred_mgmt_ip_method to vars_map_preferred_mgmt + # set_fact: + # vars_map_preferred_mgmt: "{{ vars_map_preferred_mgmt | combine({item + '_preferred_mgmt': vars_map[item] | map('combine', {'preferred_mgmt_ip_method': 'UseLoopBack'}) | map('combine', {'discovery_name': vars_map[item][0]['discovery_name'] + ' - preferred_mgmt' }) | list}) }}" + # loop: "{{ vars_map.keys() }}" + # tags: multiple_discoveries + + # - name: Set vars_map_multiple + # set_fact: + # vars_map_multiple: "{{ vars_map | combine(vars_map_preferred_mgmt) }}" + # tags: multiple_discoveries + + # - name: Print the updated vars_map_multiple + # debug: + # var: vars_map_multiple + # tags: multiple_discoveries + + # - name: Create multiple Discoveries + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ vars_map_multiple[item][0] }}" + # with_items: "{{ vars_map_multiple }}" + # tags: multiple_discoveries + # register: result_multiple_discoveries + + # # - name: Debug item + # # debug: + # # var: result_multiple_discoveries + # # when: result_multiple_discoveries is defined + + # - name: Check if multiple discoveries were successfull + # assert: + # that: + # - item.changed == true + # - "'Discovery Created Successfully' in item.msg" + # loop: "{{ result_multiple_discoveries.results }}" + # when: result_multiple_discoveries is defined + +############################################# +# Delete Discovery by name # +############################################# + + # - name: Delete all discovery + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: deleted + # config: + # - "{{ item }}" + # loop: "{{ vars_map_delete.delete_discoveries }}" + # register: result_delete_discoveries + + # # - name: Debug item + # # debug: + # # var: item + # # loop: "{{ result_delete_discoveries.results }}" + + # - name: Check if discovery was successfully deleted + # assert: + # that: + # - item.changed == true + # - "'Successfully deleted discovery' in item.msg" + # loop: "{{ result_delete_discoveries.results }}" + # when: result_delete_discoveries is defined + +############################################ +# Delete ALL Discoveries # +############################################ + + # - name: Delete all discoveries that were created + # cisco.dnac.discovery_workflow_manager: + # <<: *dnac_login + # state: deleted + # config: + # - delete_all: True + # register: result_delete_all + + # - name: Debug item + # debug: + # var: result_delete_all + # when: result_delete_all is defined diff --git a/tests/integration/ccc_discovery_management/vars/vars_discovery_management.yml b/tests/integration/ccc_discovery_management/vars/vars_discovery_management.yml new file mode 100644 index 0000000000..b2d3b28f45 --- /dev/null +++ b/tests/integration/ccc_discovery_management/vars/vars_discovery_management.yml @@ -0,0 +1,164 @@ +--- +single_ip: + - discovery_name: Single IP Discovery + discovery_type: "SINGLE" + ip_address_list: + - 204.1.2.5 + protocol_order: ssh + global_credentials: + cli_credentials_list: + - description: CLIa + username: cli-a + snmp_v3_credential_list: + - description: SNMPv3 Test a + username: admin + retry: 1 + timeout: 1 + + +ip_range: + - discovery_name: Single Range Discovery 1 + discovery_type: "RANGE" + ip_address_list: + - 204.1.2.1-204.1.2.5 + ip_filter_list: + - 204.1.2.3 + protocol_order: ssh + discovery_specific_credentials: + cli_credentials_list: + - username: cisco + password: Cisco#123 + enable_password: Cisco#123 + http_read_credential: + username: wlcaccess + password: Lablab#123 + port: 443 + secure: True + snmp_v2_read_credential: + desc: SNMPv2c Read + community: "j5aj#0z%" + snmp_v2_write_credential: + desc: SNMPv2c Write + community: "n2!y9k38" + snmp_v3_credential: + username: v3Public2 + snmp_mode: AUTHPRIV + auth_type: SHA + auth_password: Lablab#1234 + privacy_type: AES256 + privacy_password: Lablab#1234 + start_index: 1 + records_to_return: 1000 + snmp_version: v2 + retry: 1 + timeout: 2 + +# # Single IP Discovery an already existing discovery. +# # Test case - deleted and recreated when discovery with same name. +# - discovery_name: Single IP Discovery +# discovery_type: "RANGE" +# ip_address_list: +# - 204.1.2.3 +# protocol_order: ssh +# global_cli_len: 3 +# retry: 1 +# timeout: 1 + + +multi_range: + - discovery_name: MultiRange Discovery + discovery_type: "MULTI RANGE" + ip_address_list: + - 204.1.2.1-204.1.2.5 + - 204.192.3.40 + - 204.192.4.200 + - 204.1.2.6 + - 204.1.2.7 + - 204.1.2.8 + - 204.1.2.9 + ip_filter_list: + - 204.1.2.3 + protocol_order: ssh + discovery_specific_credentials: + cli_credentials_list: + - username: cisco + password: Cisco#123 + enable_password: Cisco#123 + snmp_v3_credential: + username: v3Public2 + snmp_mode: AUTHPRIV + auth_type: SHA + auth_password: Lablab#1234 + privacy_type: AES256 + privacy_password: Lablab#1234 + retry: 1 + timeout: 1 + + +cdp: + - discovery_name: CDP Discovery + discovery_type: "CDP" + ip_address_list: + - 204.1.2.1 + cdp_level: 1 + protocol_order: ssh + discovery_specific_credentials: + cli_credentials_list: + - username: cisco + password: Cisco#123 + enable_password: Cisco#123 + snmp_v3_credential: + username: v3Public2 + snmp_mode: AUTHPRIV + auth_type: SHA + auth_password: Lablab#1234 + privacy_type: AES256 + privacy_password: Lablab#1234 + retry: 1 + timeout: 1 + + +lldp: + - discovery_name: LLDP Discovery + discovery_type: "LLDP" + ip_address_list: + - 204.1.2.1 + lldp_level: 16 + protocol_order: ssh + discovery_specific_credentials: + cli_credentials_list: + - username: cisco + password: Cisco#123 + enable_password: Cisco#123 + snmp_v3_credential: + username: v3Public2 + snmp_mode: AUTHPRIV + auth_type: SHA + auth_password: Lablab#1234 + privacy_type: AES256 + privacy_password: Lablab#1234 + retry: 1 + timeout: 1 + + +cidr: + - discovery_name: CIDR Discovery + discovery_type: "CIDR" + ip_address_list: + - 204.1.2.0/24 + prefix_length: 30 + protocol_order: ssh + discovery_specific_credentials: + cli_credentials_list: + - username: cisco + password: Cisco#123 + enable_password: Cisco#123 + snmp_v3_credential: + username: v3Public2 + snmp_mode: AUTHPRIV + auth_type: SHA + auth_password: Lablab#1234 + privacy_type: AES256 + privacy_password: Lablab#1234 + retry: 1 + timeout: 1 diff --git a/tests/integration/ccc_discovery_management/vars/vars_misc.yml b/tests/integration/ccc_discovery_management/vars/vars_misc.yml new file mode 100644 index 0000000000..de35884945 --- /dev/null +++ b/tests/integration/ccc_discovery_management/vars/vars_misc.yml @@ -0,0 +1,14 @@ +--- +delete_discoveries: + - discovery_name: Single IP Discovery + # - discovery_name: Single Range Discovery 1 + - discovery_name: Multi Range Discovery + - discovery_name: CDP Discovery + - discovery_name: LLDP Discovery + - discovery_name: CIDR Discovery + - discovery_name: Single IP Discovery - preferred_mgmt + # - discovery_name: Single Range Discovery 1 - preferred_mgmt + - discovery_name: Multi Range Discovery - preferred_mgmt + - discovery_name: CDP Discovery - preferred_mgmt + - discovery_name: LLDP Discovery - preferred_mgmt + - discovery_name: CIDR Discovery - preferred_mgmt diff --git a/tests/integration/ccc_inventory_management/defaults/main.yml b/tests/integration/ccc_inventory_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_inventory_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_inventory_management/meta/main.yml b/tests/integration/ccc_inventory_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_inventory_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_inventory_management/tasks/main.yml b/tests/integration/ccc_inventory_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_inventory_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_inventory_management/tests/test_inventory_management.yml b/tests/integration/ccc_inventory_management/tests/test_inventory_management.yml new file mode 100644 index 0000000000..66a100b3eb --- /dev/null +++ b/tests/integration/ccc_inventory_management/tests/test_inventory_management.yml @@ -0,0 +1,492 @@ +--- +- debug: msg="Starting inventory management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_inventory_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: true + + # - debug: + # msg: "{{ vars_map.device_details }}" + # - debug: + # msg: "{{ vars_map.device_credential_updates }}" + # - debug: + # msg: "{{ vars_map.device_interface_updates }}" + # - debug: + # msg: "{{ vars_map.delete_devices }}" + +############################################# +# Clean Up # +############################################# + + - name: Delete device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_devices }}" + + - name: Delete site + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_sites }}" + +############################################# +# Add Devices # +############################################# + + - name: Add new device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.device_details }}" + register: result_add_device + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_add_device.results }}" + + - name: Assert device addition success + assert: + that: + - item.changed == true + - "'added to Cisco Catalyst Center' in item.msg" + loop: "{{ result_add_device.results }}" + when: result_add_device is defined + +############################################# +# Update Device Credential Details # +############################################# + + # - name: Update device credential details + # cisco.dnac.inventory_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.device_credential_updates }}" + # register: result_update_device_credentials + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_update_device_credentials.results }}" + # when: result_update_device_credentials is defined + + # - name: Assert update + # assert: + # that: + # - item.changed == true + # loop: "{{ result_update_device_credentials.results }}" + # when: result_update_device_credentials is defined + +############################################ +# Update Device Interface Detials # +############################################# + + # - name: Pause for 60 seconds before updating interfaces + # pause: + # seconds: 60 + + # - name: Update device interface details + # cisco.dnac.inventory_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.device_interface_updates }}" + # register: result_update_device_interface + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_update_device_interface.results }}" + # when: result_update_device_interface is defined + + # - name: Assert update + # assert: + # that: + # - item.changed == true + # loop: "{{ result_update_device_interface.results }}" + # when: result_update_device_interface is defined + +############################################# +# Update Device Role Detials # +############################################# + +# - name: Update device role details +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.device_role_updates }}" +# register: result_update_device_role + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_update_device_role.results }}" +# # when: result_update_device_role is defined + +# # - name: Assert device role update +# # assert: +# # that: +# # - item.changed == true +# # - "'role updated successfully' in item.response" +# # loop: "{{ result_update_device_role.results }}" +# # when: result_update_device_role is defined + +# ############################################# +# # Update Device Interface Description # +# ############################################# + +# # - name: Pause for 60 seconds before updating interfaces +# # pause: +# # seconds: 60 + +# # - name: Update device interface description post changing role to non-access +# # cisco.dnac.inventory_workflow_manager: +# # <<: *dnac_login +# # state: merged +# # config: +# # - "{{ item }}" +# # loop: "{{ vars_map.device_int_update_post_rolechange }}" +# # register: result_update_device_interface + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_update_device_interface.results }}" +# # when: result_update_device_interface is defined + +# # - name: Assert update +# # assert: +# # that: +# # - item.changed == true +# # loop: "{{ result_update_device_interface.results }}" +# # when: result_update_device_interface is defined + +# ############################################# +# # Resync Device # +# ############################################# + +# - name: Resync Device +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.device_resync }}" +# register: result_resync_device + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_resync_device.results }}" +# # when: result_resync_device is defined + +# - name: Assert device resync +# assert: +# that: +# - result_resync_device.changed == true +# - "'Synced devices' in item.response.progress" +# loop: "{{ result_resync_device.results }}" +# when: result_resync_device is defined + +# ############################################# +# # Create & Assign User Defined Field # +# ############################################# + +# - name: Create & Assign user defined field +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.create_assign_udf }}" +# register: result_create_assign_udf + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_create_assign_udf.results }}" +# # when: result_create_assign_udf is defined + +# - name: Assert user defined field creation and assignment +# assert: +# that: +# - item.changed == true +# loop: "{{ result_create_assign_udf.results }}" +# when: result_create_assign_udf is defined + +# ############################################# +# # Update User Defined Field # +# ############################################# + +# - name: Update user defined field +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.update_udf }}" +# register: result_update_udf + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_create_assign_udf.results }}" +# # when: result_update_udf is defined + +# - name: Assert user defined field updated +# assert: +# that: +# - item.changed == true +# loop: "{{ result_update_udf.results }}" +# when: result_update_udf is defined + + +# ############################################# +# # Delete User Defined Field # +# ############################################# + +# - name: Delete user defined field +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: deleted +# config: +# - "{{ item }}" +# loop: "{{ vars_map.delete_udf }}" +# register: result_delete_udf + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_delete_udf.results }}" +# # when: result_delete_udf is defined + +# - name: Assert user defined field deletion +# assert: +# that: +# - result_delete_udf.changed == true +# - "'deleted successfully' in item.response.progress" +# loop: "{{ result_delete_udf.results }}" +# when: result_delete_udf is defined + + +# ############################################# +# # Export Device Details # +# ############################################# + +# - name: Export Device Details in a CSV file +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.export_device_details }}" +# register: result_export_details + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_export_details.results }}" +# # when: result_export_details is defined + +# - name: Assert device details export +# assert: +# that: +# - item.changed == true +# loop: "{{ result_export_details.results }}" +# when: result_export_details is defined + +# ############################################# +# # Export Device Credential Details # +# ############################################# + +# - name: Export Credential Device Details in a CSV file +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.export_credential_details }}" +# register: result_export_credential_details + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_export_credential_details.results }}" +# # when: result_export_credential_details is defined + +# - name: Assert device credential details export +# assert: +# that: +# - item.changed == true +# loop: "{{ result_export_credential_details.results }}" +# when: result_export_credential_details is defined + + +# ############################################# +# # CREATE SITE # +# ############################################# + +# - name: Create sites from design_sites config +# cisco.dnac.site_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.design_sites }}" +# register: result_create_site + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_create_site.results }}" +# # when: result_create_site is defined + +# - name: Assert area creation success for each site +# assert: +# that: +# - item.changed == true +# - item.response.status == "SUCCESS" +# - "'created successfully' in item.msg" +# loop: "{{ result_create_site.results }}" +# when: result_create_site is defined + +# ############################################# +# # ASSOCIATE WIRED DEVICE TO SITE # +# ############################################# + +# - name: Assign wired device to site and then provision +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: merged +# config: +# - "{{ item }}" +# loop: "{{ vars_map.associate_wired_device }}" +# register: result_associate_device + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_associate_device.results }}" +# # when: result_associate_device is defined + +# - name: Assert Assign wired device to site and then provision +# assert: +# that: +# - item.changed == true +# loop: "{{ result_associate_device.results }}" +# when: result_associate_device is defined + + +# ############################################# +# # ASSOCIATE WIRELESS DEVICE TO SITE # +# ############################################# + +# # - name: Assign wireless device to site and then provision +# # cisco.dnac.inventory_workflow_manager: +# # <<: *dnac_login +# # state: merged +# # config: +# # - "{{ item }}" +# # loop: "{{ vars_map.associate_wireless_device }}" +# # register: result_associate_device + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_associate_device.results }}" +# # when: result_associate_device is defined + +# # - name: Assert Assign wireless device to site and then provision +# # assert: +# # that: +# # - item.changed == true +# # loop: "{{ result_associate_device.results }}" +# # when: result_associate_device is defined + +# ############################################# +# # Delete Device # +# ############################################# + +# - name: Delete device +# cisco.dnac.inventory_workflow_manager: +# <<: *dnac_login +# state: deleted +# config: +# - "{{ item }}" +# loop: "{{ vars_map.delete_devices }}" +# register: result_device_deleted + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_device_deleted.results }}" +# # when: result_device_deleted is defined + +# - name: Assert device deletion success +# assert: +# that: +# - item.changed == true +# loop: "{{ result_device_deleted.results }}" +# when: result_device_deleted is defined + +# ############################################# +# # PAUSE # +# ############################################# + +# - name: Pause for 120 seconds +# pause: +# seconds: 120 + +# ############################################# +# # DELETE SITE # +# ############################################# + +# - name: Delete sites from design_sites config +# cisco.dnac.site_workflow_manager: +# <<: *dnac_login +# state: deleted +# config: +# - "{{ item }}" +# loop: "{{ vars_map.delete_sites }}" +# register: result_delete_site + +# # - name: Debug item +# # debug: +# # var: item +# # loop: "{{ result_delete_site.results }}" +# # when: result_delete_site is defined + +# - name: Assert deletion of area success for each site +# assert: +# that: +# - item.changed == true +# - "'deleted successfully' in item.response" +# loop: "{{ result_delete_site.results }}" +# when: result_delete_site is defined diff --git a/tests/integration/ccc_inventory_management/vars/vars_inventory_management.yml b/tests/integration/ccc_inventory_management/vars/vars_inventory_management.yml new file mode 100644 index 0000000000..cc5c87ea7c --- /dev/null +++ b/tests/integration/ccc_inventory_management/vars/vars_inventory_management.yml @@ -0,0 +1,268 @@ +--- +device_details: + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + # CLI Credentials + username: "cisco" + password: "Cisco#123" + enable_password: "Cisco#123" + # SNMP Credentials + snmp_version: v3 + snmp_username: "v3Public2" + snmp_mode: "AUTHPRIV" + snmp_auth_protocol: "SHA" + snmp_auth_passphrase: "Lablab#1234" + snmp_priv_protocol: "CISCOAES256" + snmp_priv_passphrase: "Lablab#1234" + #SNMP Retry and Timeout + snmp_retry: 3 + snmp_timeout: 5 + #CLI Transport (ssh, Telnet) + cli_transport: "ssh" + netconf_port: 830 + + + # - type: "NETWORK_DEVICE" + # ip_address_list: ["204.192.6.200"] + # device_added: True + # # CLI Credentials + # username: "cisco" + # password: "Cisco#123" + # enable_password: "Cisco#123" + # # HTTP Credentials + # http_username: "wlcaccess" + # http_password: "Lablab#123" + # http_port: "443" + # http_secure: False + # # SNMP Credentials + # snmp_version: v3 + # snmp_username: "v3Public2" + # snmp_mode: "AUTHPRIV" + # snmp_auth_protocol: "SHA" + # snmp_auth_passphrase: "Lablab#1234" + # snmp_priv_protocol: "AES256" + # snmp_priv_passphrase: "Lablab#1234" + # #SNMP Retry and Timeout + # snmp_retry: 3 + # snmp_timeout: 5 + # #CLI Transport (ssh, Telnet) + # cli_transport: "ssh"s + # netconf_port: 830 + + +device_credential_updates: + # Update CLI password + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + # CLI Credentials + password: "Cisco#1234" + + + # Update SNMP privacy type + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + # SNMP Credentials + snmp_priv_protocol: "AES192" + + + # Update SNMP username + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + # SNMP Credentials + snmp_username: "v3Public2-2" + + + # Update SNMP mode + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + # SNMP Credentials + snmp_version: v3 + snmp_mode: "NOAUTHNOPRIV" + + # Update cli_transport + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + #change cli_transport from ssh to telnet + cli_transport: telnet + + # SNMPv2 credentials + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + snmp_version: v2 + snmp_ro_community: 'j5aj#0z%' + snmp_rw_community: 'j5aj#0z%' + + # Reverse changes + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + credential_update: True + # CLI Credentials + username: "cisco" + password: "Cisco#123" + enable_password: "Cisco#123" + # SNMP Credentials + snmp_version: v3 + snmp_username: "v3Public2" + snmp_mode: "AUTHPRIV" + snmp_auth_protocol: "SHA" + snmp_auth_passphrase: "Lablab#1234" + snmp_priv_protocol: "CISCOAES256" + snmp_priv_passphrase: "Lablab#1234" + #CLI Transport (ssh, Telnet) + cli_transport: "ssh" + netconf_port: 830 + + + +device_interface_updates: + # Update Interface Details + - ip_address_list: ["204.1.2.5"] + # Interface details + update_interface_details: + interface_name: ["GigabitEthernet1/0/8"] + description: "Testing for updating interface details" + vlan_id: 23 + voice_vlan_id: 45 + admin_status: "UP" + + +device_role_updates: + #Update role from access to core + - ip_address_list: ["204.1.2.5"] + role: ACCESS + + +device_int_update_post_rolechange: + # Update Interface description + - ip_address_list: ["204.1.2.5"] + # Interface details + update_interface_details: + interface_name: ["GigabitEthernet1/0/23"] + description: "Testing for updating interface description post changing role" + + +device_resync: + # Resync the device + - ip_address_list: ["204.1.2.5"] + device_resync: True + force_sync: False + + +create_assign_udf: + - ip_address_list: ["204.1.2.5"] + add_user_defined_field: + # User defined fields + - name: Test123 + description: "Added first udf for testing" + value: "value123" + - name: Test321 + description: "Added second udf for testing" + value: "value321" + + +update_udf: + - ip_address_list: ["204.1.2.5"] + add_user_defined_field: + # User defined fields + - name: Test123 + description: "modified first udf for testing" + value: "value124" + - name: Test321 + description: "modified second udf for testing" + value: "value421" + + +delete_udf: + # User defined fields + - ip_address_list: ["204.1.2.5"] + add_user_defined_field: + - name: "Test123" + - ip_address_list: ["204.1.2.5"] + add_user_defined_field: + - name: "Test321" + + +export_device_details: + - ip_address_list: ["204.1.2.5"] + export_device_list: + operation_enum: 1 + password: "Password123!" + + +export_credential_details: + - ip_address_list: ["204.1.2.5"] + export_device_list: + operation_enum: "0" + password: "Password123$" + + +design_sites: + # Create site to associate device to + - site: + area: + name: ITest_Area + parent_name: Global + site_type: area + - site: + building: + name: ITest_Building + parent_name: Global/ITest_Area + address: Bengaluru, Karnataka, India + latitude: 12.969910 + longitude: 77.597960 + country: India + site_type: building + - site: + floor: + name: ITest_Floor1 + parent_name: Global/ITest_Area/ITest_Building + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + + +associate_wired_device: + - provision_wired_device: + - device_ip: "204.1.2.5" + site_name: "Global/ITest_Area/ITest_Building/ITest_Floor1" + resync_retry_count: 200 + resync_interval: 2 + + +associate_wireless_device: + - provision_wireless_device: + - device_ip: "204.192.6.200" + site_name: "Global/ITest_Inventory_P_Area/ITest_Inventory_Building/ITest_Inventory_Floor1" + managed_ap_locations: ["Global/ITest_Inventory_P_Area/ITest_Inventory_Building/ITest_Inventory_Floor1", "Global/ITest_Inventory_S_Area/ITest_Inventory_Building/ITest_Inventory_Floor1"] + dynamic_interfaces: + - interface_ip_address: 23.23.21.12 + interface_netmask_in_cidr: 24 + interface_gateway: "gateway" + lag_or_port_number: 12 + vlan_id: 99 + interface_name: "management" + resync_retry_count: 200 + resync_retry_interval: 2 + + +delete_sites: + - site: + area: + name: ITest_Area + parent_name: Global + site_type: area + + +delete_devices: + - ip_address_list: ["204.1.2.5"] + #ip_address_list: ["204.1.2.5", "204.192.6.200"] + clean_config: False diff --git a/tests/integration/ccc_network_compliance_management/defaults/main.yml b/tests/integration/ccc_network_compliance_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_network_compliance_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_network_compliance_management/meta/main.yml b/tests/integration/ccc_network_compliance_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_network_compliance_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_network_compliance_management/tasks/main.yml b/tests/integration/ccc_network_compliance_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_network_compliance_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml b/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml new file mode 100644 index 0000000000..ed78329877 --- /dev/null +++ b/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml @@ -0,0 +1,88 @@ +--- +- debug: msg="Starting network compliance management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_network_compliance_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + + # - debug: + # msg: "{{ vars_map. }}" + +############################################# +# Clean Up # +############################################# + + - name: Delete device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_devices }}" + +############################################# +# Add Devices # +############################################# + + - name: Add new device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.device_details }}" + register: result_add_device + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_add_device.results }}" + + - name: Assert device addition success + assert: + that: + - item.changed == true + - "'added to Cisco Catalyst Center' in item.msg" + loop: "{{ result_add_device.results }}" + when: result_add_device is defined + +############################################# +# Run Full Compliance # +############################################# + + - name: Pause for 60 seconds before updating interfaces + pause: + seconds: 60 + +############################################# +# Run Full Compliance # +############################################# + + - name: Run full complaince check on Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.run_complaince }}" + register: run_complaince + + - name: Debug item + debug: + var: item + loop: "{{ run_complaince.results }}" diff --git a/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml b/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml new file mode 100644 index 0000000000..5dcf8968d0 --- /dev/null +++ b/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml @@ -0,0 +1,31 @@ +--- +device_details: + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.5"] + # CLI Credentials + username: "cisco" + password: "Cisco#123" + enable_password: "Cisco#123" + # SNMP Credentials + snmp_version: v3 + snmp_username: "v3Public2" + snmp_mode: "AUTHPRIV" + snmp_auth_protocol: "SHA" + snmp_auth_passphrase: "Lablab#1234" + snmp_priv_protocol: "CISCOAES256" + snmp_priv_passphrase: "Lablab#1234" + #SNMP Retry and Timeout + snmp_retry: 3 + snmp_timeout: 5 + #CLI Transport (ssh, Telnet) + cli_transport: "ssh" + netconf_port: 830 + + +run_complaince: + - ip_address_list: ['204.1.2.5'] + + +delete_devices: + - ip_address_list: ["204.1.2.5"] + clean_config: False \ No newline at end of file diff --git a/tests/integration/ccc_pnp_management/defaults/main.yml b/tests/integration/ccc_pnp_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_pnp_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_pnp_management/meta/main.yml b/tests/integration/ccc_pnp_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_pnp_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_pnp_management/tasks/main.yml b/tests/integration/ccc_pnp_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_pnp_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_pnp_management/tests/test_pnp_management.yml b/tests/integration/ccc_pnp_management/tests/test_pnp_management.yml new file mode 100644 index 0000000000..2fa02a6b51 --- /dev/null +++ b/tests/integration/ccc_pnp_management/tests/test_pnp_management.yml @@ -0,0 +1,226 @@ +--- +- debug: msg="Starting pnp management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_pnp_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: true + + # - debug: + # msg: "{{ vars_map.pnp_delete }}" + # - debug: + # msg: "{{ vars_map.pnp_claim }}" + # - debug: + # msg: "{{ vars_map.bulk }}" + # - debug: + # msg: "{{ vars_map.delete_devices }}" + +############################################# +# Clean Up # +############################################# + + - name: Delete PnP devices + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.pnp_delete.delete }}" + + - name: Delete PnP devices + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.bulk.add }}" + + # - name: Delete device from Inventory + # cisco.dnac.inventory_workflow_manager: + # <<: *dnac_login + # state: deleted + # config: + # - "{{ item }}" + # loop: "{{ vars_map.delete_devices }}" + +############################################# +# Add device but not Claim PNP Device # +############################################# + + - name: Adding devices but not claiming + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.pnp_delete.add }}" + register: result_add_device + + # - name: Debug Adding devices but not claiming + # debug: + # var: item + # loop: "{{ result_add_device.results }}" + # when: result_add_device is defined + + - name: Assert adding devices but not claiming + assert: + that: + - item.changed == true + - "'Only Device Added Successfully' in item.msg" + loop: "{{ result_add_device.results }}" + when: result_add_device is defined + +############################################# +# Delete Unclaimed Devices # +############################################# + + - name: Delete PnP devices + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.pnp_delete.delete }}" + register: result_delete_device + + # - name: Debug delete unclaimed devices + # debug: + # var: item + # loop: "{{ result_delete_device.results }}" + # when: result_delete_device is defined + + - name: Assert deletion of unclaimed PnP devices + assert: + that: + - item.changed == true + - "'Deleted Successfully' in item.msg" + loop: "{{ result_delete_device.results }}" + when: result_delete_device is defined + +############################################# +# Bulk Add device but not Claim PNP Device # +############################################# + + - name: Bulk Adding devices but not claiming + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.bulk.add }}" + register: result_add_device + + # - name: Debug Bulk Adding devices but not claiming + # debug: + # var: item + # loop: "{{ result_add_device.results }}" + # when: result_add_device is defined + + - name: Assert bulk adding devices but not claiming + assert: + that: + - item.changed == true + - "'imported successfully' in item.msg" + loop: "{{ result_add_device.results }}" + when: result_add_device is defined + +############################################# +# Bulk Delete Unclaimed Devices # +############################################# + + - name: Delete Bulk Unclaimed PnP devices + cisco.dnac.pnp_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.bulk.add }}" + register: result_delete_device + + # - name: Debug Bulk delete unclaimed devices + # debug: + # var: item + # loop: "{{ result_delete_device.results }}" + # when: result_delete_device is defined + + - name: Assert Bulk deletion of unclaimed PnP devices + assert: + that: + - item.changed == true + - "'Deleted Successfully' in item.msg" + loop: "{{ result_delete_device.results }}" + when: result_delete_device is defined + +############################################# +# Add and Claim PNP Device # +############################################# + + # - name: Add and Claim PnP devices + # cisco.dnac.pnp_workflow_manager: + # <<: *dnac_login + # state: merged + # config: + # - "{{ item }}" + # loop: "{{ vars_map.pnp_claim.cat9k }}" + # register: result_claim_device + + # - name: Debug Add and Claim device + # debug: + # var: item + # loop: "{{ result_claim_device.results }}" + # when: result_claim_device is defined + + # - name: Assert Add and Claim device + # assert: + # that: + # - item.changed == true + # - "'Claimed Successfully' in item.msg" + # loop: "{{ result_claim_device.results }}" + # when: result_claim_device is defined + +############################################# +# Pause to Complete Provisioning # +############################################# + + # - name: Pause for 10 minutes + # pause: + # seconds: 600 + +############################################# +# Delete Devices # +############################################# + + # - name: Delete device + # cisco.dnac.inventory_workflow_manager: + # <<: *dnac_login + # state: deleted + # config: + # - "{{ item }}" + # loop: "{{ vars_map.delete_devices }}" + # register: result_device_deleted + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_device_deleted.results }}" + # when: result_device_deleted is defined + + # - name: Assert device deletion success + # assert: + # that: + # - result_device_deleted.changed == true + # when: result_device_deleted is defined diff --git a/tests/integration/ccc_pnp_management/vars/vars_pnp_management.yml b/tests/integration/ccc_pnp_management/vars/vars_pnp_management.yml new file mode 100644 index 0000000000..40708dcf32 --- /dev/null +++ b/tests/integration/ccc_pnp_management/vars/vars_pnp_management.yml @@ -0,0 +1,56 @@ +--- +pnp_delete: + add: + - device_info: + - serial_number: FJC2721271T + hostname: SJ-EN-9300 + state: Unclaimed + pid: C9300-48T + + delete: + - device_info: + - serial_number: FJC2721271T + hostname: SJ-EN-9300 + state: Unclaimed + pid: C9300-48T + + +pnp_claim: + cat9k: + - device_info: + - serial_number: FJC2721271T + hostname: Switch + state: Unclaimed + pid: C9300-48T + site_name: Global/ITest_PnP_Area/ITest_PnP_Building + template_name: "Ansible_PNP_Switch" + project_name: Onboarding Configuration + template_params: + hostname: SJ-EN-9300 + interface: GigabitEthernet1/1/4 + + +bulk: + add: + - device_info: + - serial_number: FOX2639PAYD + hostname: SJ-EWLC-1 + state: Unclaimed + pid: C9800-40-K9 + - serial_number: FJC271924D9 + hostname: SJ-EN-9300 + state: Unclaimed + pid: C9300-48UXM + - serial_number: FJC271925Q1 + hostname: NY-EN-9300 + state: Unclaimed + pid: C9300-48UXM + - serial_number: FJC2402A0TX + hostname: SF-BN-ISR + state: Unclaimed + pid: ISR4451-X/K9 + + +delete_devices: + - ip_address_list: ["204.1.2.1"] + clean_config: False diff --git a/tests/integration/ccc_site_management/defaults/main.yml b/tests/integration/ccc_site_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_site_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_site_management/meta/main.yml b/tests/integration/ccc_site_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_site_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_site_management/tasks/main.yml b/tests/integration/ccc_site_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_site_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_site_management/tests/test_site_management.yml b/tests/integration/ccc_site_management/tests/test_site_management.yml new file mode 100644 index 0000000000..c0e538c79b --- /dev/null +++ b/tests/integration/ccc_site_management/tests/test_site_management.yml @@ -0,0 +1,121 @@ +--- +- debug: msg="Starting site management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_site_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + config_verify: true + + # - debug: + # msg: "{{ vars_map.design_sites }}" + # - debug: + # msg: "{{ vars_map.update_sites }}" + # - debug: + # msg: "{{ vars_map.delete_sites }}" + +############################################# +# Clean Up # +############################################# + + - name: Clean up before test + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_sites }}" + +############################################# +# CREATE SITES # +############################################# + + - name: Create sites + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.design_sites }}" + register: result_create_site + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_create_site.results }}" + # when: result_create_site is defined + + - name: Assert area creation success for each site + assert: + that: + - item.changed == true + - "'created successfully' in item.msg" + loop: "{{ result_create_site.results }}" + when: result_create_site is defined + +############################################# +# UPDATE SITES # +############################################# + + - name: Update sites + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.update_sites }}" + register: result_update_site + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_update_site.results }}" + # when: result_update_site is defined + + - name: Assert area update success for each site + assert: + that: + - item.changed == true + - "'updated successfully' in item.msg" + loop: "{{ result_update_site.results }}" + when: result_update_site is defined + +############################################# +# DELETE SITES # +############################################# + + - name: Delete sites + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_sites }}" + register: result_delete_site + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_delete_site.results }}" + # when: result_delete_site is defined + + - name: Assert deletion success for each site + assert: + that: + - item.changed == true + - "'deleted successfully' in item.response" + loop: "{{ result_delete_site.results }}" + when: result_delete_site is defined diff --git a/tests/integration/ccc_site_management/vars/vars_site_management.yml b/tests/integration/ccc_site_management/vars/vars_site_management.yml new file mode 100644 index 0000000000..8ad35c6177 --- /dev/null +++ b/tests/integration/ccc_site_management/vars/vars_site_management.yml @@ -0,0 +1,461 @@ +--- +design_sites: + # USA-Test Site Hierarchy + - site: + area: + name: USA-Test + parent_name: Global + site_type: area + - site: + area: + name: SAN JOSE + parent_name: Global/USA-Test + site_type: area + - site: + area: + name: RTP + parent_name: Global/USA-Test + site_type: area + - site: + area: + name: BayAreaGuest + parent_name: Global/USA-Test + site_type: area + - site: + area: + name: New York + parent_name: Global/USA-Test + site_type: area + - site: + area: + name: SAN-FRANCISCO + parent_name: Global/USA-Test + site_type: area + - site: + area: + name: BERKELEY + parent_name: Global/USA-Test + site_type: area + + + + - site: + building: + name: BLD10 + parent_name: Global/USA-Test/RTP + address: Ev Chargers Bldg 10, 7200-10 Kit Creek Rd, Morrisville, North Carolina 27560, United States + latitude: 35.85992111421487 + longitude: -78.8829258991226 + country: United States + site_type: building + - site: + building: + name: BLD11 + parent_name: Global/USA-Test/RTP + address: Cisco Systems, 7200 Kit Creek Rd, Morrisville, North Carolina 27560, United States + latitude: 35.86059627310624 + longitude: -78.88105620286412 + country: United States + site_type: building + - site: + building: + name: BLD12 + parent_name: Global/USA-Test/RTP + address: Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States + latitude: 35.8611847591779 + longitude: -78.88217248318003 + country: United States + site_type: building + - site: + building: + name: BLD23 + parent_name: Global/USA-Test/SAN JOSE + address: McCarthy Blvd, San Jose, California 95131, United States + latitude: 37.398188 + longitude: -121.912974 + country: United States + site_type: building + - site: + building: + name: BLD20 + parent_name: Global/USA-Test/SAN JOSE + address: 725 Alder Drive, Milpitas, California 95035, United States + latitude: 37.415947 + longitude: -121.916327 + country: United States + site_type: building + - site: + building: + name: BLD_GB + parent_name: Global/USA-Test/BayAreaGuest + address: 725 Alder Drive, Milpitas, California 95035, United States + latitude: 37.415947 + longitude: -121.916327 + country: United States + site_type: building + - site: + building: + name: BLDNYC + parent_name: Global/USA-Test/New York + address: McCarthy Blvd, San Jose, California 95131, United States + latitude: 37.398188 + longitude: -121.912974 + country: United States + site_type: building + - site: + building: + name: BLD_SF + parent_name: Global/USA-Test/SAN-FRANCISCO + address: McCarthy Blvd, San Jose, California 95131, United States + latitude: 37.398188 + longitude: -121.912974 + country: United States + site_type: building + - site: + building: + name: BLD_SF1 + parent_name: Global/USA-Test/SAN-FRANCISCO + address: McCarthy Blvd, San Jose, California 95131, United States + latitude: 37.398188 + longitude: -121.912974 + country: United States + site_type: building + - site: + building: + name: BLDBERK + parent_name: Global/USA-Test/BERKELEY + address: 725 Alder Drive, Milpitas, California 95035, United States + latitude: 37.415947 + longitude: -121.916327 + country: United States + site_type: building + + - site: + floor: + name: BLD10_FLOOR1 + parent_name: Global/USA-Test/RTP/BLD10 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: BLD10_FLOOR2 + parent_name: Global/USA-Test/RTP/BLD10 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: BLD10_FLOOR3 + parent_name: Global/USA-Test/RTP/BLD10 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 3 + site_type: floor + - site: + floor: + name: BLD11_FLOOR1 + parent_name: Global/USA-Test/RTP/BLD11 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: BLD11_FLOOR2 + parent_name: Global/USA-Test/RTP/BLD11 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: BLD11_FLOOR3 + parent_name: Global/USA-Test/RTP/BLD11 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 3 + site_type: floor + - site: + floor: + name: BLD12_FLOOR1 + parent_name: Global/USA-Test/RTP/BLD12 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: BLD12_FLOOR2 + parent_name: Global/USA-Test/RTP/BLD12 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: BLD12_FLOOR3 + parent_name: Global/USA-Test/RTP/BLD12 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 3 + site_type: floor + - site: + floor: + name: FLOOR1_LEVEL1 + parent_name: Global/USA-Test/SAN JOSE/BLD23 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR1_LEVEL2 + parent_name: Global/USA-Test/SAN JOSE/BLD23 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR1_LEVEL3 + parent_name: Global/USA-Test/SAN JOSE/BLD23 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR1_LEVEL4 + parent_name: Global/USA-Test/SAN JOSE/BLD23 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: BLD20_FLOOR1 + parent_name: Global/USA-Test/SAN JOSE/BLD20 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: BLD20_FLOOR2 + parent_name: Global/USA-Test/SAN JOSE/BLD20 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: FLOOR1 + parent_name: Global/USA-Test/New York/BLDNYC + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR2 + parent_name: Global/USA-Test/New York/BLDNYC + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: FLOOR1 + parent_name: Global/USA-Test/SAN-FRANCISCO/BLD_SF + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR2 + parent_name: Global/USA-Test/SAN-FRANCISCO/BLD_SF + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: FLOOR1 + parent_name: Global/USA-Test/SAN-FRANCISCO/BLD_SF1 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + - site: + floor: + name: FLOOR2 + parent_name: Global/USA-Test/SAN-FRANCISCO/BLD_SF1 + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 2 + site_type: floor + - site: + floor: + name: FLOOR1_LEVEL1 + parent_name: Global/USA-Test/BERKELEY/BLDBERK + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + + #India-Test Site Hierarchy + - site: + area: + name: India-Test + parent_name: Global + site_type: area + - site: + area: + name: Bangalore + parent_name: Global/India-Test + site_type: area + - site: + building: + name: Mantri Square + parent_name: Global/India-Test/Bangalore + address: Bengaluru, Karnataka, India + latitude: 12.969910 + longitude: 77.597960 + country: India + site_type: building + - site: + floor: + name: Floor1 + parent_name: Global/India-Test/Bangalore/Mantri Square + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + + #Mexico Site Hierarchy + - site: + area: + name: Mexico-Test + parent_name: Global + site_type: area + + #Canada Site Hierarchy + - site: + area: + name: Canada-Test + parent_name: Global + site_type: area + + +update_sites: + - site: + building: + name: BLD12 + parent_name: Global/USA-Test/RTP + address: Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States + latitude: 38.8611847591779 + longitude: 72.88217248318003 + country: United States + site_type: building + - site: + floor: + name: FLOOR1 + parent_name: Global/USA-Test/SAN-FRANCISCO/BLD_SF + rf_model: Cubes And Walled Offices + width: 200.00 + length: 200.00 + height: 20.00 + floor_number: 1 + site_type: floor + - site: + building: + name: Mantri Square + parent_name: Global/India-Test/Bangalore + address: Bengaluru, Karnataka, India + latitude: 18.969910 + longitude: 20.597960 + country: India + site_type: building + - site: + floor: + name: Floor1 + parent_name: Global/India-Test/Bangalore/Mantri Square + rf_model: Cubes And Walled Offices + width: 200.00 + length: 200.00 + height: 20.00 + floor_number: 1 + site_type: floor + + +delete_sites: + - site: + area: + name: USA-Test + parent_name: Global + site_type: area + - site: + area: + name: India-Test + parent_name: Global + site_type: area + - site: + area: + name: Mexico-Test + parent_name: Global + site_type: area + - site: + area: + name: Canada-Test + parent_name: Global + site_type: area diff --git a/tests/integration/ccc_swim_management/defaults/main.yml b/tests/integration/ccc_swim_management/defaults/main.yml new file mode 100644 index 0000000000..55a93fc23d --- /dev/null +++ b/tests/integration/ccc_swim_management/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" \ No newline at end of file diff --git a/tests/integration/ccc_swim_management/meta/main.yml b/tests/integration/ccc_swim_management/meta/main.yml new file mode 100644 index 0000000000..5514b6a40c --- /dev/null +++ b/tests/integration/ccc_swim_management/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] \ No newline at end of file diff --git a/tests/integration/ccc_swim_management/tasks/main.yml b/tests/integration/ccc_swim_management/tasks/main.yml new file mode 100644 index 0000000000..09e0832ca2 --- /dev/null +++ b/tests/integration/ccc_swim_management/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity \ No newline at end of file diff --git a/tests/integration/ccc_swim_management/tests/test_swim_management.yml b/tests/integration/ccc_swim_management/tests/test_swim_management.yml new file mode 100644 index 0000000000..ea4627cef2 --- /dev/null +++ b/tests/integration/ccc_swim_management/tests/test_swim_management.yml @@ -0,0 +1,313 @@ +--- +- debug: msg="Starting swim management test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_swim_management.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + + # - debug: + # msg: "{{ vars_map. }}" + # - debug: + # msg: "{{ vars_map. }}" + # - debug: + # msg: "{{ vars_map. }}" + +############################################# +# Clean Up # +############################################# + + - name: Delete device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_devices }}" + register: result_device_deleted + + - name: Delete site + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_sites }}" + register: result_delete_site + +############################################# +# CREATE SITE # +############################################# + + - name: Create sites + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.design_sites }}" + register: result_create_site + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_create_site.results }}" + # when: result_create_site is defined + + - name: Assert area creation success for each site + assert: + that: + - item.changed == true + - "'created successfully' in item.msg" + loop: "{{ result_create_site.results }}" + when: result_create_site is defined + +############################################# +# Add Devices # +############################################# + + - name: Add new device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.device_details }}" + register: result_add_device + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_add_device.results }}" + + - name: Assert device addition success + assert: + that: + - item.changed == true + - "'added to Cisco Catalyst Center' in item.msg" + loop: "{{ result_add_device.results }}" + when: result_add_device is defined + +############################################# +# ASSOCIATE WIRED DEVICE TO SITE # +############################################# + + - name: Assign wired device to site and then provision + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: merged + config: + - "{{ item }}" + loop: "{{ vars_map.associate_wired_device }}" + register: result_associate_device + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_associate_device.results }}" + # when: result_associate_device is defined + + - name: Assert Assign wired device to site and then provision + assert: + that: + - item.changed == true + loop: "{{ result_associate_device.results }}" + when: result_associate_device is defined + + +############################################# +# IMPORT IMAGE # +############################################# + + - name: SWIM task - import + cisco.dnac.swim_workflow_manager: + <<: *dnac_login + config: + - "{{ item }}" + loop: "{{ vars_map.image_details }}" + register: result_import_image + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_import_image.results }}" + + # - name: Assert import images + # assert: + # that: + # - item.changed == true + # - '"imported successfully" in item.msg' + # loop: "{{ result_import_image.results }}" + # when: result_import_image is defined + +############################################# +# TAG IMAGE # +############################################# + + - name: SWIM task - tag + cisco.dnac.swim_workflow_manager: + <<: *dnac_login + config: + - "{{ item }}" + loop: "{{ vars_map.image_golden_tagging_details}}" + register: result_tag_image + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_tag_image.results }}" + + - name: Assert tag images + assert: + that: + - item.changed == true + - '"Tagging image" in item.msg' + loop: "{{ result_tag_image.results }}" + when: result_tag_image is defined + +############################################# +# DISTRIBUTE # +############################################# + + - name: SWIM task - distribute stack + cisco.dnac.swim_workflow_manager: + <<: *dnac_login + config: + - "{{ item }}" + loop: "{{ vars_map.image_distributation_details }}" + register: result_distribute_stack + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_distribute_stack.results }}" + + - name: Assert distribution + assert: + that: + - item.changed == true + loop: "{{ result_distribute_stack.results }}" + when: result_distribute_stack is defined + +############################################# +# ACTIVATE IMAGE # +############################################# + + # - name: SWIM task - activate + # cisco.dnac.swim_workflow_manager: + # <<: *dnac_login + # config: + # - "{{ item }}" + # loop: "{{ vars_map.image_activation_details }}" + # register: result_activate_image + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_activate_image.results }}" + + # - name: Assert image activation + # assert: + # that: + # - item.changed == true + # loop: "{{ result_activate_image.results }}" + # when: result_activate_image is defined + +############################################# +# UNTAG IMAGE # +############################################# + + - name: SWIM task - untag + cisco.dnac.swim_workflow_manager: + <<: *dnac_login + config: + - "{{ item }}" + loop: "{{ vars_map.image_golden_untagging_details }}" + register: result_untag_image + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_untag_image.results }}" + + - name: Assert untag images + assert: + that: + - item.changed == true + - '"Untagging of image" in item.msg' + - '"successful" in item.msg' + loop: "{{ result_untag_image.results }}" + when: result_untag_image is defined + +############################################# +# Delete Device # +############################################# + + - name: Delete device + cisco.dnac.inventory_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_devices }}" + register: result_device_deleted + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_device_deleted.results }}" + # when: result_device_deleted is defined + + - name: Assert device deletion success + assert: + that: + - result_device_deleted.changed == true + when: result_device_deleted is defined + +############################################# +# PAUSE # +############################################# + + - name: Pause for 120 seconds + pause: + seconds: 120 + +############################################# +# DELETE SITE # +############################################# + + - name: Delete sites from design_sites config + cisco.dnac.site_workflow_manager: + <<: *dnac_login + state: deleted + config: + - "{{ item }}" + loop: "{{ vars_map.delete_sites }}" + register: result_delete_site + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_delete_site.results }}" + # when: result_delete_site is defined + + - name: Assert deletion of area success for each site + assert: + that: + - item.changed == true + - "'deleted successfully' in item.response" + loop: "{{ result_delete_site.results }}" + when: result_delete_site is defined diff --git a/tests/integration/ccc_swim_management/vars/vars_swim_management.yml b/tests/integration/ccc_swim_management/vars/vars_swim_management.yml new file mode 100644 index 0000000000..5138bbcf5e --- /dev/null +++ b/tests/integration/ccc_swim_management/vars/vars_swim_management.yml @@ -0,0 +1,124 @@ +--- +image_details: + - import_image_details: + type: "remote" + url_details: + payload: + - source_url: http://172.21.236.183/swim/V1712_2_CCO/cat9k_iosxe.17.12.02.SPA.bin + third_party: False + - import_image_details: + type: "remote" + url_details: + payload: + - source_url: http://10.197.156.28/stda/abimishr/cat9k_iosxe.17.12.01.SPA.bin + third_party: False + + + +image_golden_tagging_details: + - tagging_details: + image_name: "cat9k_iosxe.17.12.01.SPA.bin" + site_name: "Global/ITest_Swim_Area/ITest_Swim_Building/ITest_Swim_Floor1" + device_role: "DISTRIBUTION" + device_image_family_name: "Cisco Catalyst 9300 Switch" + tagging: True + +image_distributation_details: + - image_distribution_details: + image_name: "cat9k_lite_iosxe.17.12.01.SPA.bin" + site_name: "Global/ITest_Swim_Area/ITest_Swim_Building/ITest_Swim_Floor1" + device_role: "DISTRIBUTION" + device_family_name: "Switches and Hubs" + device_series_name: "Cisco Catalyst 9300 Series Switches" + +image_activation_details: + - image_activation_details: + image_name: "cat9k_iosxe.17.12.02.SPA.bin" + site_name: "Global/ITest_Swim_Area/ITest_Swim_Building/ITest_Swim_Floor1" + device_role: "DISTRIBUTION" + device_family_name: "Switches and Hubs" + device_series_name: "Cisco Catalyst 9300 Series Switches" + scehdule_validate: False + distribute_if_needed: True + +image_golden_untagging_details: + - tagging_details: + image_name: "cat9k_iosxe.17.12.01.SPA.bin" + site_name: "Global/ITest_Swim_Area/ITest_Swim_Building/ITest_Swim_Floor1" + device_role: "DISTRIBUTION" + device_image_family_name: "Cisco Catalyst 9300 Switch" + tagging: False + + +design_sites: + # Create site to associate device to + - site: + area: + name: ITest_Swim_Area + parent_name: Global + site_type: area + - site: + building: + name: ITest_Swim_Building + parent_name: Global/ITest_Swim_Area + address: Bengaluru, Karnataka, India + latitude: 12.969910 + longitude: 77.597960 + country: India + site_type: building + - site: + floor: + name: ITest_Swim_Floor1 + parent_name: Global/ITest_Swim_Area/ITest_Swim_Building + rf_model: Cubes And Walled Offices + width: 100.00 + length: 100.00 + height: 10.00 + floor_number: 1 + site_type: floor + + +device_details: + - type: "NETWORK_DEVICE" + ip_address_list: ["204.1.2.3"] + device_added: True + # CLI Credentials + username: "cisco" + password: "Cisco#123" + enable_password: "Cisco#123" + # SNMP Credentials + snmp_version: v3 + snmp_username: "v3Public2" + snmp_mode: "AUTHPRIV" + snmp_auth_protocol: "SHA" + snmp_auth_passphrase: "Lablab#1234" + snmp_priv_protocol: "CISCOAES256" + snmp_priv_passphrase: "Lablab#1234" + #SNMP Retry and Timeout + snmp_retry: 3 + snmp_timeout: 5 + #CLI Transport (ssh, Telnet) + cli_transport: "ssh" + netconf_port: 830 + + +associate_wired_device: + - provision_wired_device: + - device_ip: "204.1.2.3" + site_name: "Global/ITest_Swim_Area/ITest_Swim_Building/ITest_Swim_Floor1" + resync_retry_count: 200 + resync_interval: 2 + + +delete_sites: + - site: + area: + name: ITest_Swim_Area + parent_name: Global + site_type: area + + +delete_devices: + - ip_address_list: ["204.1.2.3"] + #ip_address_list: ["204.1.2.5", "204.192.6.200"] + clean_config: False From a13c931c3d56241cb6143d08baa061a211f097e7 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 18 Jun 2024 11:56:48 +0530 Subject: [PATCH 028/119] Return a failure message when the task or execution is not compeleted within the given time --- plugins/module_utils/dnac.py | 14 ++++++++------ .../ise_radius_integration_workflow_manager.py | 10 +++++++--- 2 files changed, 15 insertions(+), 9 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index d4b470dca2..6f6c67c1ec 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -362,9 +362,10 @@ def check_task_response_status(self, response, validation_string, api_name, data while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: - self.log("Max timeout of {0} sec has reached for the execution id '{1}'. " - "Exiting the loop due to unexpected API '{2}' status." - .format(self.max_timeout, task_id, api_name), "WARNING") + self.msg = "Max timeout of {0} sec has reached for the task id '{1}'. ".format(self.max_timeout, task_id) + \ + "Exiting the loop due to unexpected API '{2}' status.".format(api_name) + self.log(self.msg, "WARNING") + self.status = "failed" break task_details = self.get_task_details(task_id) @@ -442,9 +443,10 @@ def check_execution_response_status(self, response, api_name): while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: - self.log("Max timeout of {0} sec has reached for the execution id '{1}'. " - "Exiting the loop due to unexpected API '{2}' status." - .format(self.max_timeout, execution_id, api_name), "WARNING") + self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'. ".format(self.max_timeout, execution_id) + \ + "Exiting the loop due to unexpected API '{2}' status.".format(api_name) + self.log(self.msg, "WARNING") + self.status = "failed" break execution_details = self.get_execution_details(execution_id) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index f3346c6a9e..83fb2660ee 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1242,9 +1242,9 @@ def update_auth_policy_server(self, ipAddress): while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: - self.log("Max timeout of {0} sec has reached for the execution id '{1}'. Exiting the loop due to " - "unexpected API 'add_authentication_and_policy_server_access_configuration' status." - .format(self.max_timeout, task_id), "WARNING") + self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'.".format(self.max_timeout, task_id) + \ + "Exiting the loop due to unexpected API 'add_authentication_and_policy_server_access_configuration' status." + self.status = "failed" break task_details = self.get_task_details(task_id) @@ -1271,6 +1271,10 @@ def update_auth_policy_server(self, ipAddress): self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") + if self.status == "failed": + self.log(self.msg, "ERROR") + return + if is_ise_server and is_certificate_required: trusted_server = self.want.get("trusted_server") self.accept_cisco_ise_server_certificate(ipAddress, trusted_server) From a267d85374cb7c1ae68c45c45c3d930d59a6799a Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 18 Jun 2024 18:40:33 +0530 Subject: [PATCH 029/119] Addressed the review comments --- plugins/module_utils/dnac.py | 10 ++++++---- 1 file changed, 6 insertions(+), 4 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 6f6c67c1ec..39c76b7d32 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -362,8 +362,9 @@ def check_task_response_status(self, response, validation_string, api_name, data while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: - self.msg = "Max timeout of {0} sec has reached for the task id '{1}'. ".format(self.max_timeout, task_id) + \ - "Exiting the loop due to unexpected API '{2}' status.".format(api_name) + self.msg = "Max timeout of {max_timeout} sec has reached for the task id '{task_id}'. " \ + .format(max_timeout=self.max_timeout, task_id=task_id) + \ + "Exiting the loop due to unexpected API '{api_name}' status.".format(api_name=api_name) self.log(self.msg, "WARNING") self.status = "failed" break @@ -443,8 +444,9 @@ def check_execution_response_status(self, response, api_name): while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: - self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'. ".format(self.max_timeout, execution_id) + \ - "Exiting the loop due to unexpected API '{2}' status.".format(api_name) + self.msg = "Max timeout of {max_timeout} sec has reached for the execution id '{execution_id}'. "\ + .format(max_timeout=self.max_timeout, execution_id=execution_id) + \ + "Exiting the loop due to unexpected API '{api_name}' status.".format(api_name=api_name) self.log(self.msg, "WARNING") self.status = "failed" break From 5528fc381a2fe6c626957f3a0f79628e65833ea1 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 19 Jun 2024 11:12:00 +0530 Subject: [PATCH 030/119] Changes made to make the module inline with the IT cases --- plugins/modules/device_credential_workflow_manager.py | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/plugins/modules/device_credential_workflow_manager.py b/plugins/modules/device_credential_workflow_manager.py index 1d412f5013..7f96c33a7c 100644 --- a/plugins/modules/device_credential_workflow_manager.py +++ b/plugins/modules/device_credential_workflow_manager.py @@ -2487,7 +2487,8 @@ def delete_device_credential(self, config): self.module.fail_json(msg=self.msg, response=final_response) else: self.result['changed'] = changed_status - self.msg = "Global device credentials deleted successfully" + self.msg = "Global Device Credentials Deleted Successfully" + result_global_credential.get("Deletion").update({"msg": self.msg}) self.log(str(self.msg), "INFO") self.status = "success" From d857f98d03fdb62318f90f6d18f34c8843319450 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 19 Jun 2024 12:12:00 +0530 Subject: [PATCH 031/119] Added a function to check the task tree when the failure response asks to check the task tree --- plugins/module_utils/dnac.py | 36 ++++++++++++++++++++++++++++++++++++ 1 file changed, 36 insertions(+) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 39c76b7d32..880bb79abb 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -375,6 +375,10 @@ def check_task_response_status(self, response, validation_string, api_name, data if task_details.get("isError") is True: if task_details.get("failureReason"): self.msg = str(task_details.get("failureReason")) + string_check = "check task tree" + if string_check in self.msg.lower(): + time.sleep(self.params.get('dnac_task_poll_interval')) + self.msg = self.check_task_tree_response(task_id) else: self.msg = str(task_details.get("progress")) self.status = "failed" @@ -673,6 +677,38 @@ def is_json(self, file_path): self.log("The provided file '{0}' is not in JSON format".format(file_path), "CRITICAL") return False + def check_task_tree_response(self, task_id): + """ + Returns the task tree response of the task ID. + + Parameters: + task_id (string) - The unique identifier of the task for which you want to retrieve details. + + Returns: + error_msg (str) - Returns the task tree error message of the task ID. + """ + + result = None + response = self.dnac._exec( + family="task", + function='get_task_tree', + params={"task_id": task_id} + ) + + self.log("Retrieving task tree details by the API 'get_task_tree' using task ID: {0}, Response: {1}" + .format(task_id, response), "DEBUG") + if response and isinstance(response, dict): + result = response.get('response') + + error_msg = "" + progress_list = [] + for item in result: + if item.get("isError") is True: + progress_list.append(item.get("progress")) + + error_msg = ". ".join(progress_list) + "." + return error_msg + def is_list_complex(x): return isinstance(x[0], dict) or isinstance(x[0], list) From 8d4e815d7371ce3cf0bda57e4301cdb92ba8da25 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 19 Jun 2024 12:17:45 +0530 Subject: [PATCH 032/119] Changed the formats of logs --- plugins/module_utils/dnac.py | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 880bb79abb..d261573cf0 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -694,9 +694,8 @@ def check_task_tree_response(self, task_id): function='get_task_tree', params={"task_id": task_id} ) - - self.log("Retrieving task tree details by the API 'get_task_tree' using task ID: {0}, Response: {1}" - .format(task_id, response), "DEBUG") + self.log("Retrieving task tree details by the API 'get_task_tree' using task ID: {task_id}, Response: {response}" + .format(task_id=task_id, response=response), "DEBUG") if response and isinstance(response, dict): result = response.get('response') From ab46b3081015091e7bd2fc438ac002f7575fa8e9 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 19 Jun 2024 14:42:27 +0530 Subject: [PATCH 033/119] Handle invalid event types, severities and categories for creating/updating notification, add additional check while deleting the notification, update webhook url validation --- ...ents_and_notifications_workflow_manager.py | 249 +++++++++++++++--- 1 file changed, 211 insertions(+), 38 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 392c12a28c..870eee8ca7 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -2759,6 +2759,122 @@ def get_syslog_subscription_detail(self, destination): self.log(self.msg, "ERROR") self.check_return_status() + def is_valid_event_types(self, event_types): + """ + Validate the given event types against the defined types. + Args: + self (object): An instance of a class used for interacting with Cisco Catalyst Center. + event_types (list): A list of event types to be validated. Each event type should be a string. + Returns: + self (object): The instance of the class, with updated status and message if validation fails. + Description: + This function checks if the provided event types are valid based on a predefined list of acceptable event types. + The defined types are: ["SECURITY", "APP", "NETWORK", "SYSTEM", "AUDIT_LOG", "INTEGRATIONS"]. + If `event_types` is not a list or contains invalid event types, it updates the instance status to "failed" + and logs an error message. The function returns the instance itself to allow for method chaining. + """ + + defined_types = ["SECURITY", "APP", "NETWORK", "SYSTEM", "AUDIT_LOG", "INTEGRATIONS"] + invalid_event_types = [] + + if not isinstance(event_types, list): + self.status = "failed" + self.msg = "Given event types '{0}' should be of type list containing str element".format(event_types) + self.log(self.msg, "ERROR") + return self + + for e_type in event_types: + if e_type.upper() not in defined_types: + invalid_event_types.append(e_type) + + if invalid_event_types: + self.status = "failed" + self.msg = ( + "Invalid Event type(s) '{0}' details given in the playbook, with this unable to create/update" + " event subscription notification in Cisco Catalyst Center.".format(str(invalid_event_types)) + ) + self.log(self.msg, "ERROR") + + return self + + def is_valid_event_categories(self, event_categories): + """ + Validates the provided event categories against a predefined list of acceptable categories. + Args: + self (object): An instance of a class used for interacting with Cisco Catalyst Center. + event_categories (list of str): A list of event categories to be validated. Each category should be a string. + Returns: + self (object): The instance of the class, with updated status and message based on validation results. + Description: + This method checks if the provided event categories are valid by comparing them against a predefined list of acceptable categories: + ["TASK_FAILURE", "TASK_COMPLETE", "WARN", "TASK_PROGRESS", "QUERY", "COMMAND", "ALERT", "INFO", "CONVERSATION", "ERROR"]. + If the input is not a list, or if any category in the list is invalid, the method updates the instance's status to "failed" and + sets an appropriate error message. It also logs the error message. + """ + + categories = ["TASK_FAILURE", "TASK_COMPLETE", "WARN", "TASK_PROGRESS", "QUERY", "COMMAND", "ALERT", "INFO", "CONVERSATION", "ERROR"] + invalid_event_categories = [] + + if not isinstance(event_categories, list): + self.status = "failed" + self.msg = "Given event categories '{0}' should be of type list containing str element".format(event_categories) + self.log(self.msg, "ERROR") + return self + + for category in event_categories: + if category.upper() not in categories: + invalid_event_categories.append(category) + + if invalid_event_categories: + self.status = "failed" + self.msg = ( + "Invalid Event categorioes '{0}' details given in the playbook, with this unable to create/update" + " event subscription notification in Cisco Catalyst Center.".format(str(invalid_event_categories)) + ) + self.log(self.msg, "ERROR") + + return self + + def is_valid_event_severities(self, event_severities): + """ + Validates the provided event severities to ensure they are within the acceptable range of 1 to 5. + Args: + self (object): An instance of a class used for interacting with Cisco Catalyst Center. + event_severities (list of str): A list of event severities to be validated. Each severity should be a string + representing a digit between 1 and 5. + Returns: + self (object): The instance of the class, with updated status and message based on validation results. + Description: + This method checks if the provided event severities are valid by ensuring they are strings representing digits between + 1 and 5. If the input is not a list, or if any severity in the list is invalid, the method updates the instance's status + to "failed" and sets an appropriate error message. It also logs the error message. + """ + + invalid_event_severities = [] + + if not isinstance(event_severities, list): + self.status = "failed" + self.msg = "Given event severities '{0}' should be of type list containing str element".format(event_severities) + self.log(self.msg, "ERROR") + return self + + for severity in event_severities: + if not severity.isdigit(): + invalid_event_severities.append(severity) + elif severity.isdigit() and int(severity) not in range(1, 6): + invalid_event_severities.append(severity) + + if invalid_event_severities: + self.status = "failed" + self.msg = ( + "Invalid Event severities '{0}' details given in the playbook, with this unable to create/update" + " event subscription notification in Cisco Catalyst Center. Select the severity from the" + " range(1,5).".format(str(invalid_event_severities)) + ) + self.log(self.msg, "ERROR") + + return self + def get_event_ids(self, events): """ Retrieves the event IDs for a given list of event names from the Cisco Catalyst Center. @@ -2930,6 +3046,15 @@ def collect_syslog_notification_playbook_params(self, syslog_notification_detail "event_sources": "sources" } + if syslog_notification_details.get("event_types"): + self.is_valid_event_types(syslog_notification_details.get("event_types")).check_return_status() + + if syslog_notification_details.get("event_categories"): + self.is_valid_event_categories(syslog_notification_details.get("event_categories")).check_return_status() + + if syslog_notification_details.get("event_severities"): + self.is_valid_event_severities(syslog_notification_details.get("event_severities")).check_return_status() + for key in filter_keys: value = syslog_notification_details.get(key) if value: @@ -3119,7 +3244,14 @@ def compare_notification_filters(self, filters_in_playbook, filters_in_ccc): "Cisco Catalyst Center, so the notification needs an update.").format(subdomains_input), "INFO") return True elif isinstance(value, list): - list_needs_update = self.is_element_missing(value, filters_in_ccc[key]) + if key == "severities": + severity_list = [] + for item in value: + severity_list.append(int(item)) + list_needs_update = self.is_element_missing(severity_list, filters_in_ccc[key]) + else: + list_needs_update = self.is_element_missing(value, filters_in_ccc[key]) + if list_needs_update: self.log(("Parameter '{0}' given in the playbook does not match with the value present in Cisco Catalyst " "Center so notification needs update.").format(key), "INFO") @@ -3458,6 +3590,15 @@ def collect_webhook_notification_playbook_params(self, webhook_notification_deta "event_sources": "sources" } + if webhook_notification_details.get("event_types"): + self.is_valid_event_types(webhook_notification_details.get("event_types")).check_return_status() + + if webhook_notification_details.get("event_categories"): + self.is_valid_event_categories(webhook_notification_details.get("event_categories")).check_return_status() + + if webhook_notification_details.get("event_severities"): + self.is_valid_event_severities(webhook_notification_details.get("event_severities")).check_return_status() + for key in filter_keys: value = webhook_notification_details.get(key) if value: @@ -3945,6 +4086,15 @@ def collect_email_notification_playbook_params(self, email_notification_details) "event_sources": "sources" } + if email_notification_details.get("event_types"): + self.is_valid_event_types(email_notification_details.get("event_types")).check_return_status() + + if email_notification_details.get("event_categories"): + self.is_valid_event_categories(email_notification_details.get("event_categories")).check_return_status() + + if email_notification_details.get("event_severities"): + self.is_valid_event_severities(email_notification_details.get("event_severities")).check_return_status() + for key in filter_keys: value = email_notification_details.get(key) if value: @@ -4336,18 +4486,14 @@ def get_diff_merged(self, config): url = webhook_params.get('url') regex_pattern = re.compile( - r'^https://' # Ensure the URL starts with "https://" - r'(' - r'(([A-Za-z0-9-*.&@]+\.)+[A-Za-z]{2,6})|' # Domain name with wildcards and special characters - r'localhost|' # Localhost - r'(?:(?:\d{1,3}\.){3}\d{1,3}\b\.?)' # Partial or complete IPv4 address with optional trailing dot - r'(\[[A-Fa-f0-9:]+\])?' # Optional IPv6 address in square brackets (e.g., [2001:db8::1]) - r'|' # Alternation for different valid segments - r'([A-Za-z-_.&@]+)' # Hostname with allowed special characters - r')' - r'(:\d+)?' # Optional port - r'(\/[A-Za-z0-9._~:/?#[@!$&\'()*+,;=-]*)?' # Optional path - r'$' # End of the string + r'^(https?:\/\/)?' # protocol + r'((([a-z\d]([a-z\d-]*[a-z\d])*)\.)+[a-z]{2,}|' # domain name + r'((\d{1,3}\.){3}\d{1,3})|' # OR IPv4 address + r'(\[[0-9a-fA-F:.]+\]))' # OR IPv6 address + r'(\:\d+)?(\/[-a-z\d%_.~+]*)*' # port and path + r'(\?[;&a-z\d%_.~+=-]*)?' # query string + r'(\#[-a-z\d_]*)?$', # fragment locator + re.IGNORECASE ) # Check if the input string matches the pattern @@ -4360,7 +4506,7 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - if webhook_params.get('method') and webhook_params.get('method') not in ["POST", "PUT"]: + if webhook_params.get("method") and webhook_params.get("method") not in ["POST", "PUT"]: self.status = "failed" self.msg = ( "Invalid Webhook method name '{0}' for creating/updating Webhook destination in Cisco Catalyst Center. " @@ -4369,9 +4515,9 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - webhook_dest_detail_in_ccc = self.have.get('webhook_destinations') + webhook_dest_detail_in_ccc = self.have.get("webhook_destinations") - if not self.have.get('webhook_destinations'): + if not self.have.get("webhook_destinations"): # Need to Add snmp destination in Cisco Catalyst Center with given playbook params if not url: self.status = "failed" @@ -4394,8 +4540,8 @@ def get_diff_merged(self, config): self.update_webhook_destination(webhook_params, webhook_dest_detail_in_ccc).check_return_status() # Create/Update Email destination in Cisco Catalyst Center - if config.get('email_destination'): - email_details = self.want.get('email_details') + if config.get("email_destination"): + email_details = self.want.get("email_details") email_params = self.collect_email_playbook_params(email_details) primary_config = email_params.get("primarySMTPConfig") @@ -4412,11 +4558,11 @@ def get_diff_merged(self, config): self.log(self.msg, "ERROR") return self - if not self.have.get('email_destination'): + if not self.have.get("email_destination"): # Need to Add email destination in Cisco Catalyst Center with given playbook params invalid_email_params = [] - if email_params.get('primarySMTPConfig') and not email_params.get('primarySMTPConfig').get('hostName'): + if email_params.get("primarySMTPConfig") and not email_params.get("primarySMTPConfig").get("hostName"): self.status = "failed" self.msg = ( "Required parameter '{0}' for configuring Email Destination in Cisco Catalyst Center " @@ -4442,10 +4588,10 @@ def get_diff_merged(self, config): self.update_email_destination(email_params, email_dest_detail_in_ccc).check_return_status() # Create/Update Syslog destination in Cisco Catalyst Center - if config.get('syslog_destination'): - syslog_details = self.want.get('syslog_details') - name = syslog_details.get('name') - port = syslog_details.get('port') + if config.get("syslog_destination"): + syslog_details = self.want.get("syslog_details") + name = syslog_details.get("name") + port = syslog_details.get("port") server_address = syslog_details.get("server_address") if not name: @@ -4492,7 +4638,7 @@ def get_diff_merged(self, config): self.update_syslog_destination(syslog_details, syslog_details_in_ccc).check_return_status() # Create/Update snmp destination in Cisco Catalyst Center - if config.get('snmp_destination'): + if config.get("snmp_destination"): snmp_details = self.want.get("snmp_details") destination = snmp_details.get("name") @@ -4546,9 +4692,9 @@ def get_diff_merged(self, config): self.update_snmp_destination(snmp_params, snmp_dest_detail_in_ccc).check_return_status() # Create/Update ITSM Integration Settings in Cisco Catalyst Center - if config.get('itsm_setting'): - itsm_details = self.want.get('itsm_details') - itsm_name = itsm_details.get('instance_name') + if config.get("itsm_setting"): + itsm_details = self.want.get("itsm_details") + itsm_name = itsm_details.get("instance_name") if not itsm_name: self.status = "failed" self.msg = "Instance name is required parameter for adding/updating ITSM integration setting in Cisco Catalyst Center." @@ -4626,9 +4772,9 @@ def get_diff_merged(self, config): self.update_itsm_integration_setting(itsm_params, itsm_in_ccc).check_return_status() # Create Rest Webhook Events Subscription Notification in Cisco Catalyst Center - if config.get('webhook_event_notification'): - webhook_notification_details = self.want.get('webhook_event_notification') - notification_name = webhook_notification_details.get('name') + if config.get("webhook_event_notification"): + webhook_notification_details = self.want.get("webhook_event_notification") + notification_name = webhook_notification_details.get("name") if not notification_name: self.status = "failed" @@ -4661,9 +4807,9 @@ def get_diff_merged(self, config): self.update_webhook_notification(webhook_notification_params, webhook_notification_in_ccc).check_return_status() # Create Email Events Subscription Notification in Cisco Catalyst Center - if config.get('email_event_notification'): - email_notification_details = self.want.get('email_event_notification') - notification_name = email_notification_details.get('name') + if config.get("email_event_notification"): + email_notification_details = self.want.get("email_event_notification") + notification_name = email_notification_details.get("name") if not notification_name: self.status = "failed" @@ -4697,9 +4843,9 @@ def get_diff_merged(self, config): self.update_email_notification(email_notification_params, email_notification_in_ccc).check_return_status() # Create Syslog Events Subscription Notification in Cisco Catalyst Center - if config.get('syslog_event_notification'): - syslog_notification_details = self.want.get('syslog_event_notification') - notification_name = syslog_notification_details.get('name') + if config.get("syslog_event_notification"): + syslog_notification_details = self.want.get("syslog_event_notification") + notification_name = syslog_notification_details.get("name") if not notification_name: self.status = "failed" @@ -4810,6 +4956,15 @@ def get_diff_deleted(self, config): webhook_notification_details = self.want.get('webhook_event_notification') webhook_notification_name = webhook_notification_details.get('name') + if not webhook_notification_name: + self.status = "failed" + self.msg = ( + "Name is required parameter for deleting Webhook events subscription notification" + "in Cisco Catalyst Center." + ) + self.log(self.msg, "ERROR") + return self + if not self.have.get("webhook_subscription_notifications"): self.status = "success" self.result['changed'] = False @@ -4839,6 +4994,15 @@ def get_diff_deleted(self, config): email_notification_details = self.want.get('email_event_notification') email_notification_name = email_notification_details.get('name') + if not email_notification_name: + self.status = "failed" + self.msg = ( + "Name is required parameter for deleting Email events subscription notification" + "in Cisco Catalyst Center." + ) + self.log(self.msg, "ERROR") + return self + if not self.have.get("email_subscription_notifications"): self.status = "success" self.result['changed'] = False @@ -4850,7 +5014,7 @@ def get_diff_deleted(self, config): self.result['response'] = self.msg return self - email_notification_id = self.have.get("email_subscription_notifications").get("subscriptionId") + email_notification_id = self.have.get("email_subscription_notifications")[0].get("subscriptionId") if email_notification_id: self.delete_events_subscription_notification(email_notification_id, email_notification_name).check_return_status() @@ -4868,6 +5032,15 @@ def get_diff_deleted(self, config): syslog_notification_details = self.want.get('syslog_event_notification') syslog_notification_name = syslog_notification_details.get('name') + if not syslog_notification_name: + self.status = "failed" + self.msg = ( + "Name is required parameter for deleting Syslog events subscription notification" + "in Cisco Catalyst Center." + ) + self.log(self.msg, "ERROR") + return self + if not self.have.get("syslog_subscription_notifications"): self.status = "success" self.result['changed'] = False From 3a610c2c4153f5cf6ca919d9658f6f11f10ed1f7 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 19 Jun 2024 14:46:12 +0530 Subject: [PATCH 034/119] Addressed the review comments --- plugins/module_utils/dnac.py | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index d261573cf0..7712f7c635 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -696,16 +696,16 @@ def check_task_tree_response(self, task_id): ) self.log("Retrieving task tree details by the API 'get_task_tree' using task ID: {task_id}, Response: {response}" .format(task_id=task_id, response=response), "DEBUG") + error_msg = "" if response and isinstance(response, dict): result = response.get('response') + error_messages = [] + for item in result: + if item.get("isError") is True: + error_messages.append(item.get("progress")) - error_msg = "" - progress_list = [] - for item in result: - if item.get("isError") is True: - progress_list.append(item.get("progress")) + error_msg = ". ".join(error_messages) + "." - error_msg = ". ".join(progress_list) + "." return error_msg From c639eed07ef17ea31aa6d8fbcb2f5b519201403c Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 19 Jun 2024 15:13:14 +0530 Subject: [PATCH 035/119] Addressed the review comments --- plugins/module_utils/dnac.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 7712f7c635..a268f0ad10 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -688,7 +688,6 @@ def check_task_tree_response(self, task_id): error_msg (str) - Returns the task tree error message of the task ID. """ - result = None response = self.dnac._exec( family="task", function='get_task_tree', @@ -704,7 +703,8 @@ def check_task_tree_response(self, task_id): if item.get("isError") is True: error_messages.append(item.get("progress")) - error_msg = ". ".join(error_messages) + "." + if error_messages: + error_msg = ". ".join(error_messages) + "." return error_msg From bf208ba94f36b964c68222bc3119eee53001bf3b Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Thu, 20 Jun 2024 12:16:00 +0530 Subject: [PATCH 036/119] Addressed review comments --- ...ents_and_notifications_workflow_manager.py | 42 ++++++++++--------- 1 file changed, 23 insertions(+), 19 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 870eee8ca7..106623a3a2 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -2779,7 +2779,7 @@ def is_valid_event_types(self, event_types): if not isinstance(event_types, list): self.status = "failed" - self.msg = "Given event types '{0}' should be of type list containing str element".format(event_types) + self.msg = "Given event types '{0}' should be a list of strings.".format(event_types) self.log(self.msg, "ERROR") return self @@ -2790,8 +2790,9 @@ def is_valid_event_types(self, event_types): if invalid_event_types: self.status = "failed" self.msg = ( - "Invalid Event type(s) '{0}' details given in the playbook, with this unable to create/update" - " event subscription notification in Cisco Catalyst Center.".format(str(invalid_event_types)) + "Invalid event type(s) {0} provided in the playbook. Unable to create or update " + "event subscription notifications in Cisco Catalyst Center due to these unrecognized" + " types.".format(invalid_event_types) ) self.log(self.msg, "ERROR") @@ -2817,7 +2818,7 @@ def is_valid_event_categories(self, event_categories): if not isinstance(event_categories, list): self.status = "failed" - self.msg = "Given event categories '{0}' should be of type list containing str element".format(event_categories) + self.msg = "Given event categories '{0}' should be a list of strings.".format(event_categories) self.log(self.msg, "ERROR") return self @@ -2828,8 +2829,9 @@ def is_valid_event_categories(self, event_categories): if invalid_event_categories: self.status = "failed" self.msg = ( - "Invalid Event categorioes '{0}' details given in the playbook, with this unable to create/update" - " event subscription notification in Cisco Catalyst Center.".format(str(invalid_event_categories)) + "Invalid event catergory/categories {0} provided in the playbook. Unable to create or update " + "event subscription notifications in Cisco Catalyst Center due to these unrecognized categories." + .format(invalid_event_categories) ) self.log(self.msg, "ERROR") @@ -2854,22 +2856,24 @@ def is_valid_event_severities(self, event_severities): if not isinstance(event_severities, list): self.status = "failed" - self.msg = "Given event severities '{0}' should be of type list containing str element".format(event_severities) + self.msg = "Given event severities '{0}' should be a list of strings.".format(event_severities) self.log(self.msg, "ERROR") return self for severity in event_severities: - if not severity.isdigit(): - invalid_event_severities.append(severity) - elif severity.isdigit() and int(severity) not in range(1, 6): + try: + severity_int = int(severity) + if severity_int not in range(1, 6): + invalid_event_severities.append(severity) + except ValueError: invalid_event_severities.append(severity) if invalid_event_severities: self.status = "failed" self.msg = ( - "Invalid Event severities '{0}' details given in the playbook, with this unable to create/update" - " event subscription notification in Cisco Catalyst Center. Select the severity from the" - " range(1,5).".format(str(invalid_event_severities)) + "Invalid event severity/severities provided in the playbook: {0}. " + "Unable to create or update event subscription notifications in Cisco Catalyst Center. " + "Severity levels must be integers within the range 1 to 5.".format(invalid_event_severities) ) self.log(self.msg, "ERROR") @@ -4959,8 +4963,8 @@ def get_diff_deleted(self, config): if not webhook_notification_name: self.status = "failed" self.msg = ( - "Name is required parameter for deleting Webhook events subscription notification" - "in Cisco Catalyst Center." + "A name is a required parameter for deleting syslog events subscription notification" + " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") return self @@ -4997,8 +5001,8 @@ def get_diff_deleted(self, config): if not email_notification_name: self.status = "failed" self.msg = ( - "Name is required parameter for deleting Email events subscription notification" - "in Cisco Catalyst Center." + "A name is a required parameter for deleting email events subscription notification" + " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") return self @@ -5035,8 +5039,8 @@ def get_diff_deleted(self, config): if not syslog_notification_name: self.status = "failed" self.msg = ( - "Name is required parameter for deleting Syslog events subscription notification" - "in Cisco Catalyst Center." + "A name is a required parameter for deleting syslog events subscription notification" + " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") return self From 9d58bb522b2ae77dfd1419a03bfc9cfa35cf5677 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sat, 22 Jun 2024 16:14:08 -0700 Subject: [PATCH 037/119] 2 Bug Fixes: network compliance module --- .../network_compliance_workflow_manager.py | 529 +++++++++++------- 1 file changed, 314 insertions(+), 215 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 56f6d16b52..bc6fb56ab4 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -61,6 +61,12 @@ Note - This operation cannot be performed on Access Points (APs) and if APs are provided, they will be skipped. type: bool default: True + run_compliance_batch_size: + description: Specifies the number of devices to be included in a single batch for compliance operations. + This parameter is crucial for optimizing performance during large-scale compliance checks, as processing devices in + manageable batches enhances the speed and efficiency of the operation. + type: int + default: 100 run_compliance_categories: description: Specifying compliance categories allows you to trigger compliance checks only for the mentioned categories. Category can have one or more values from among the options "INTENT", "RUNNING_CONFIG", "IMAGE", "PSIRT", "EOX", "NETWORK_SETTINGS". @@ -87,7 +93,6 @@ compliance.Compliance.commit_device_configuration task.Task.get_task_by_id task.Task.get_task_tree - compliance.Compliance.get_compliance_detail compliance.Compliance.compliance_details_of_device - Paths used are @@ -95,8 +100,8 @@ post /dna/intent/api/v1/network-device-config/write-memory get /dna/intent/api/v1/task/{taskId} get /dna/intent/api/v1/task/{taskId}/tree - get /dna/intent/api/v1/compliance/detail get /dna/intent/api/v1/compliance/${deviceUuid}/detail + """ EXAMPLES = r""" @@ -378,6 +383,7 @@ def validate_input(self): "site_name": {"type": "str", "required": False}, "run_compliance": {"type": "bool", "required": False, "default": True}, "run_compliance_categories": {"type": "list", "elements": "str", "required": False}, + "run_compliance_batch_size": {"type": "int", "required": False, "default": 100}, "sync_device_config": {"type": "bool", "required": False, "default": False}, } @@ -413,11 +419,11 @@ def validate_ip4_address_list(self, ip_address_list): for ip in ip_address_list: if not self.is_valid_ipv4(ip): - self.msg = "IP address {0} is not valid".format(ip) + self.msg = "IP address: {0} is not valid".format(ip) self.log(self.msg, "ERROR") self.module.fail_json(self.msg) - self.log("Successfully validated the IP address/es: {0}".format(ip_address_list), "DEBUG") + self.log("Successfully validated the IP address(es): {0}".format(", ".join(ip_address_list)), "DEBUG") def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_compliance, run_compliance_categories): """ @@ -440,13 +446,12 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia """ # Initializing empty dicts/lists run_compliance_params = {} - compliance_detail_params = {} valid_categories = ["INTENT", "RUNNING_CONFIG", "IMAGE", "PSIRT", "EOX", "NETWORK_SETTINGS"] if run_compliance_categories: # Validate the categories provided if not all(category.upper() in valid_categories for category in run_compliance_categories): - msg = "Invalid category provided. Valid categories are {0}.".format(valid_categories) + msg = "Invalid category provided. Valid categories are {0}.".format(", ".join(valid_categories)) self.log(msg, "ERROR") self.module.fail_json(msg) @@ -454,52 +459,35 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia # run_compliance_params run_compliance_params["deviceUuids"] = list(mgmt_ip_instance_id_map.values()) run_compliance_params["triggerFull"] = False - categories_copy = run_compliance_categories.copy() - run_compliance_params["categories"] = categories_copy - - # compliance_detail_params - compliance_detail_params["deviceUuids"] = ",".join(list(mgmt_ip_instance_id_map.values())) - compliance_types = run_compliance_categories - if "INTENT" in compliance_types: - compliance_types.remove("INTENT") - compliance_types.extend(["NETWORK_PROFILE", "APPLICATION_VISIBILITY", "WORKFLOW", "FABRIC", "NETWORK_SETTINGS"]) - compliance_types = list(set(compliance_types)) - compliance_detail_params["complianceType"] = "', '".join(compliance_types) - compliance_detail_params["complianceType"] = "'" + compliance_detail_params['complianceType'] + "'" - # Case when run_compliance_categories provided but run_compliance = False - else: - msg = "Since run_compliance is set to {0}, even though run_compliance_categories are provided {1}, ".format( - run_compliance, run_compliance_categories) - msg += "Run Compliance Check will not be executed." - self.log(msg, "WARNING") + run_compliance_params["categories"] = run_compliance_categories - elif run_compliance: + if run_compliance: # run_compliance_params run_compliance_params["deviceUuids"] = list(mgmt_ip_instance_id_map.values()) run_compliance_params["triggerFull"] = True - # compliance_detail_params - compliance_detail_params["deviceUuids"] = ",".join(list(mgmt_ip_instance_id_map.values())) - # Check for devices with Compliance Status of "IN_PROGRESS" and update parameters accordingly if run_compliance_params: - device_in_progress = [] + device_in_progress = set() - response = self.get_compliance_detail(compliance_detail_params) + + response = self.get_compliance_report(run_compliance_params, mgmt_ip_instance_id_map) if not response: msg = ( "Error occurred when retrieving Compliance Report to identify if there are " "devices with 'IN_PROGRESS' status. This is required on device(s): {0}" - .format(list(mgmt_ip_instance_id_map.keys())) + .format(", ".join(list(mgmt_ip_instance_id_map.keys()))) ) self.log(msg) self.module.fail_json(msg) # Iterate through the response to identify devices with 'IN_PROGRESS' status - for device in response: - if device["status"] == "IN_PROGRESS": - device_in_progress.append(device["deviceUuid"]) - self.log("Devices currently with a Compliance Status of 'IN_PROGRESS': {0}".format(device_in_progress), "DEBUG") + for device_ip, compliance_details_list in response.items(): + for compliance_type in compliance_details_list: + if compliance_type.get("status") == "IN_PROGRESS": + device_in_progress.add(compliance_type.get("deviceUuid")) + + self.log("Devices currently with a Compliance Status of 'IN_PROGRESS': {0}".format(list(device_in_progress)), "DEBUG") if device_in_progress: # Update run_compliance_params to exclude devices with 'IN_PROGRESS' status @@ -507,7 +495,7 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia msg = "Excluding 'IN_PROGRESS' devices from compliance check. Updated run_compliance_params: {0}".format(run_compliance_params) self.log(msg, "DEBUG") - return run_compliance_params, compliance_detail_params + return run_compliance_params def site_exists(self, site_name): """ @@ -610,7 +598,7 @@ def get_device_ids_from_ip(self, ip_address_list): # Log an error message if any exception occurs during the process self.log("Error while fetching device ID for device: '{0}' from Cisco Catalyst Center: {1}".format(device_ip, str(e)), "ERROR") if not mgmt_ip_instance_id_map: - self.msg = "No reachable devices found among the provided IP addresses: {0}".format(', '.join(ip_address_list)) + self.msg = "No reachable devices found among the provided IP addresses: {0}".format(", ".join(ip_address_list)) self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) @@ -716,12 +704,12 @@ def get_device_id_list(self, ip_address_list, site_name): return mgmt_ip_instance_id_map - def is_sync_required(self, modified_response, mgmt_ip_instance_id_map): + def is_sync_required(self, response, mgmt_ip_instance_id_map): """ Determine if synchronization of device configurations is required. Args: - modified_response (dict): A dictionary containing modified responses for each device. + response (dict): A dictionary containing modified responses for each device. mgmt_ip_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. Returns: @@ -739,11 +727,11 @@ def is_sync_required(self, modified_response, mgmt_ip_instance_id_map): # Validate if sync is required self.log("Compliance Report for {0} operation for device(s) {1} : {2}".format( - task_name, list(mgmt_ip_instance_id_map.keys()), modified_response), "INFO") + task_name, list(mgmt_ip_instance_id_map.keys()), response), "INFO") # Categorize the devices based on status - "COMPLIANT", "NON_COMPLIANT", "OTHER"(status other than COMPLIANT and NON_COMPLIANT) categorized_devices = {"COMPLIANT": {}, "NON_COMPLIANT": {}, "OTHER": {}} - for ip_address, compliance_type in modified_response.items(): + for ip_address, compliance_type in response.items(): status = compliance_type[0]["status"] if status == "NON_COMPLIANT": categorized_devices["NON_COMPLIANT"][ip_address] = compliance_type @@ -752,12 +740,12 @@ def is_sync_required(self, modified_response, mgmt_ip_instance_id_map): else: categorized_devices["OTHER"][ip_address] = compliance_type - self.log("Devices Categorized based on Compliance status: {0}".format(categorized_devices), "INFO") + self.log("Device(s) Categorized based on Compliance status: {0}".format(categorized_devices), "INFO") # Validate if all devices are "COMPLIANT" - then sync not required - if len(categorized_devices["COMPLIANT"]) == len(mgmt_ip_instance_id_map): - msg = "Device(s) {0} are already compliant with the RUNNING_CONFIG compliance type. Therefore, {1} is not required.".format( - list(mgmt_ip_instance_id_map.keys()), task_name) + if len(categorized_devices["COMPLIANT"]) + len(categorized_devices["OTHER"]) == len(mgmt_ip_instance_id_map): + msg = "Device(s): {0} are already compliant with the RUNNING_CONFIG compliance type. Therefore, {1} is not required.".format( + ", ".join(list(mgmt_ip_instance_id_map.keys())), task_name) required = False return required, msg, categorized_devices @@ -778,7 +766,6 @@ def get_want(self, config): # Initialize parameters run_compliance_params = {} sync_device_config_params = {} - compliance_detail_params = {} compliance_detail_params_sync = {} compliance_details = {} @@ -788,6 +775,7 @@ def get_want(self, config): run_compliance = config.get("run_compliance") run_compliance_categories = config.get("run_compliance_categories") sync_device_config = config.get("sync_device_config") + run_compliance_batch_size = config.get("run_compliance_batch_size") # Validate either ip_address_list OR site_name is present if not any([ip_address_list, site_name]): @@ -813,13 +801,13 @@ def get_want(self, config): mgmt_ip_instance_id_map = self.get_device_id_list(ip_address_list, site_name) if not mgmt_ip_instance_id_map: # Log an error message if mgmt_ip_instance_id_map is empty - msg = ("No device UUIDs were fetched for network compliance operations with the provided IP addresses: {0} " - "or site name: {1}. This could be due to Unreachable devices or access points (APs).").format(ip_address_list, site_name) + msg = ("No device UUIDs were fetched for network compliance operations with the provided IP address(es): {0} " + "or site name: {1}. This could be due to Unreachable devices or access points (APs).").format(", ".join(ip_address_list), site_name) self.log(msg, "ERROR") self.module.fail_json(msg) # Run Compliance Paramters - run_compliance_params, compliance_detail_params = self.validate_run_compliance_paramters( + run_compliance_params = self.validate_run_compliance_paramters( mgmt_ip_instance_id_map, run_compliance, run_compliance_categories) # Sync Device Configuration Parameters @@ -829,21 +817,21 @@ def get_want(self, config): } compliance_detail_params_sync = { - "deviceUuid": ",".join(list(mgmt_ip_instance_id_map.values())), - "complianceType": "RUNNING_CONFIG" + "deviceUuids": list(mgmt_ip_instance_id_map.values()), + "categories": ["RUNNING_CONFIG"] } # Validate if Sync Device Configuration is required on the device(s) - response = self.get_compliance_detail(compliance_detail_params_sync) + response = self.get_compliance_report(compliance_detail_params_sync, mgmt_ip_instance_id_map) if not response: msg = "Error occurred when retrieving Compliance Report to identify if Sync Device Config Operation " - msg += "is required on device(s): {0}".format(list(mgmt_ip_instance_id_map.keys())) + msg += "is required on device(s): {0}".format(", ".join(list(mgmt_ip_instance_id_map.keys()))) self.log(msg) self.module.fail_json(msg) - compliance_details = self.modify_compliance_response(response, mgmt_ip_instance_id_map) - required, self.msg, categorized_devices = self.is_sync_required(compliance_details, mgmt_ip_instance_id_map) - self.log("Is Sync Requied: {0} {1}".format(required, self.msg), "DEBUG") + compliance_details = response + required, self.msg, categorized_devices = self.is_sync_required(response, mgmt_ip_instance_id_map) + self.log("Is Sync Requied: {0} -- {1}".format(required, self.msg), "DEBUG") if not required: self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) @@ -854,10 +842,15 @@ def get_want(self, config): excluded_device_ids = set(other_device_ids) | set(compliant_device_ids) if excluded_device_ids: + # Convert excluded_device_ids to their corresponding UUIDs + excluded_device_uuids = [mgmt_ip_instance_id_map[ip] for ip in excluded_device_ids if ip in mgmt_ip_instance_id_map] + # Exclude devices in the "OTHER" category from sync_device_config_params - sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_ids] - msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(excluded_device_ids) + sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_uuids] + #sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_ids] + msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(", ".join(excluded_device_ids)) self.log(msg, "WARNING") + self.log("Updated 'sync_device_config_params' parameters: {0}".format(sync_device_config_params), "DEBUG") # Construct the "want" dictionary containing the desired state parameters want = {} @@ -866,8 +859,8 @@ def get_want(self, config): site_name=site_name, mgmt_ip_instance_id_map=mgmt_ip_instance_id_map, run_compliance_params=run_compliance_params, + run_compliance_batch_size=run_compliance_batch_size, sync_device_config_params=sync_device_config_params, - compliance_detail_params=compliance_detail_params, compliance_detail_params_sync=compliance_detail_params_sync, compliance_details=compliance_details ) @@ -938,7 +931,7 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): # If no compliance details were found, update the result with an error message if not final_response: - self.msg = "No Compliance Details found for the devices: {0}".format(', '.join(device_list)) + self.msg = "No Compliance Details found for the devices: {0}".format(", ".join(device_list)) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -982,74 +975,7 @@ def get_compliance_details_of_device(self, compliance_details_of_device_params, self.log(msg, "ERROR") return None - def get_compliance_detail(self, compliance_detail_params): - """ - Execute the GET compliance detail operation. - Args: - compliance_detail_params (dict): A dictionary containing parameters for the compliance detail operation. - Returns: - dict: A dictionary containing details of the compliance detail response. - Returns None if there is an error. - """ - # Execute the GET compliance detial operation - try: - response = self.dnac_apply["exec"]( - family="compliance", - function="get_compliance_detail", - params=compliance_detail_params, - op_modifies=True - ) - self.log("Response received post 'get_compliance_detail' API call: {0}".format(str(response)), "DEBUG") - - if response: - response = response.response - else: - self.log("No response received from the 'get_compliance_detail' API call.", "ERROR") - return response - - # Log and handle any exceptions that occur during the execution - except Exception as e: - self.msg = "An error occurred while retrieving Compliance Details using 'get_compliance_detail' API call " - self.msg += "for {0}: {1}".format(compliance_detail_params, str(e)) - self.update_result("failed", False, self.msg, "ERROR") - self.check_return_status() - - def modify_compliance_response(self, response, mgmt_ip_instance_id_map): - """ - Modifies the compliance response by mapping device UUIDs to management IP addresses. - Parameters: - response (list of dict): The original compliance response. - mgmt_ip_instance_id_map (dict): Mapping of management IP addresses to instance IDs. - Returns: - dict: Modified compliance response with management IP addresses as keys. - Description: - This method takes the original compliance response and maps device UUIDs to their corresponding management - IP addresses using the provided mapping. It then constructs a modified response where each IP address is a key - associated with a list of compliance items related to that device. - """ - modified_response = {} - ip_address = None - - for item in response: - device_uuid = item.get("deviceUuid") - - # Find the corresponding management IP address for the device UUID - for ip, uuid in mgmt_ip_instance_id_map.items(): - if uuid == device_uuid: - ip_address = ip - break - - # If the IP address is found, add the item to the modified response - # If ip_address and item.get("status")!= "NOT_APPLICABLE": - if ip_address: - if ip_address not in modified_response: - modified_response[ip_address] = [] - modified_response[ip_address].append(item) - - self.log("Modified compliance detail response: {0}".format(modified_response), "DEBUG") - return modified_response - - def run_compliance(self, run_compliance_params): + def run_compliance(self, run_compliance_params, batch_size): """ Executes a compliance check operation in Cisco DNA Center. Parameters: @@ -1062,28 +988,46 @@ def run_compliance(self, run_compliance_params): """ # Execute the compliance check operation - try: - response = self.dnac_apply["exec"]( - family="compliance", - function="run_compliance", - params=run_compliance_params, - op_modifies=True, - ) - self.log("Response received post 'run_compliancee' API call is {0}".format(str(response)), "DEBUG") + device_uuids = run_compliance_params.get("deviceUuids") + batches_dict = {} - if response: - self.result.update(dict(response=response["response"])) - self.log("Task Id for the 'run_compliance' task is {0}".format(response.response.get("taskId")), "INFO") - return response.response.get("taskId") - else: - self.log("No response received from the 'run_compliance' API call.", "ERROR") - return None + if len(device_uuids) > batch_size: + batches = [device_uuids[i:i + batch_size] for i in range(0, len(device_uuids), batch_size)] + else: + batches = [device_uuids] + self.log("The following batches have been created for the compliance operation: {0}".format(batches), "DEBUG") - # Log and handle any exceptions that occur during the execution - except Exception as e: - self.msg = "An error occurred while executing the 'run_compliance' operation for {0}: {1}".format(run_compliance_params, str(e)) - self.update_result("failed", False, self.msg, "ERROR") - self.check_return_status() + for idx, batch in enumerate(batches): + self.log("Executing 'run_compliance' operation on batch: {0} - {1}".format(idx, batch), "DEBUG") + batch_params = run_compliance_params.copy() + batch_params["deviceUuids"] = batch + self.log("Batch {0} Parameters: {1}".format(idx, batch_params), "DEBUG") + + try: + response = self.dnac_apply["exec"]( + family="compliance", + function="run_compliance", + params=batch_params, + op_modifies=True, + ) + self.log("Response received post 'run_compliance' API call is {0}".format(str(response)), "DEBUG") + + if response: + self.result.update(dict(response=response["response"])) + task_id = response.response.get("taskId") + self.log("Task Id for the 'run_compliance' task is {0}".format(task_id), "DEBUG") + if task_id: + batches_dict[idx] = {"task_id": task_id, "batch_params": batch_params} + else: + self.log("No response received from the 'run_compliance' API call.", "ERROR") + + # Log and handle any exceptions that occur during the execution + except Exception as e: + msg = ("An error occurred while executing the 'run_compliance' operation for parameters - {0}. " + "Error: {1}".format(batch_params, str(e))) + self.log(msg, "CRITICAL") + + return batches_dict def sync_device_config(self, sync_device_config_params): """ @@ -1118,7 +1062,8 @@ def sync_device_config(self, sync_device_config_params): # Log the error if an exception occurs during the API call except Exception as e: - self.msg = "Error occurred while synchronizing device configuration for {0}: {1}".format(sync_device_config_params, str(e)) + self.msg = ("Error occurred while synchronizing device configuration for parameters - {0}. " + "Error: {1}".format(sync_device_config_params, str(e))) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -1154,7 +1099,7 @@ def get_task_status(self, task_id, task_name): # Log the error if an exception occurs during the API call except Exception as e: - self.msg = "Error occurred while retrieving 'get_task_by_id' for Task {0} with Task id {1}: {2}".format(task_name, task_id, str(e)) + self.msg = "Error occurred while retrieving 'get_task_by_id' for Task {0} with Task id {1}. Error: {2}".format(task_name, task_id, str(e)) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -1241,7 +1186,7 @@ def exit_while_loop(self, start_time, task_id, task_name, response): """ # If the elapsed time exceeds the timeout period - if time.time() - start_time > 360: + if time.time() - start_time > self.params.get("dnac_api_task_timeout"): if response.get("data"): # If there is data in the response, include it in the error message self.msg = "Task {0} with task id {1} has not completed within the timeout period. Task Status: {2} ".format( @@ -1271,29 +1216,32 @@ def handle_error(self, task_name, mgmt_ip_instance_id_map, failure_reason=None): # If failure reason is provided, include it in the error message if failure_reason: self.msg = "An error occurred while performing {0} on device(s): {1}. The operation failed due to the following reason: {2}".format( - task_name, list(mgmt_ip_instance_id_map.keys()), failure_reason) + task_name, ", ".join(list(mgmt_ip_instance_id_map.keys())), failure_reason) # If no failure reason is provided, generate a generic error message else: self.msg = "An error occurred while performing {0} on device(s): {1}".format( - task_name, list(mgmt_ip_instance_id_map.keys())) + task_name, ", ".join(list(mgmt_ip_instance_id_map.keys()))) # Update the result with failure status and log the error message self.update_result("failed", False, self.msg, "ERROR") return self - def get_compliance_task_status(self, task_id, mgmt_ip_instance_id_map): + def get_task_result(self, task_id, device_ids): """ This function retrieves the status of compliance check tasks in Cisco Catalyst Center. Parameters: - - task_id: The ID of the compliance check task. - - mgmt_ip_instance_id_map: A mapping of management IP addresses to instance IDs. + - task_id (str): The ID of the compliance check task. + - device_ids (list): A list of device UUIDs involved in the compliance check task. Returns: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + dict: A dictionary containing the task ID as the key, and a dictionary with 'msg' and 'status' as the value. Description: - This function continuously checks the status of a compliance check task until completion. + This function continuously checks the status of a compliance check task until completion or timeout. It handles various scenarios such as task completion, task failure, or errors during execution. Upon successful completion, it logs the modified compliance response and updates the result accordingly. + If the task does not complete within the timeout period, it returns a timeout status. + If there is an error during task execution, it returns the error message and status. + If the task fails, it returns the failure message and status. """ task_name = "Run Compliance Check" @@ -1304,37 +1252,161 @@ def get_compliance_task_status(self, task_id, mgmt_ip_instance_id_map): # Check if response returned if not response: - self.msg = "Error retrieving Task status for {0} with Task Id: {1}".format(task_name, task_id) - self.update_result("failed", False, self.msg, "ERROR") - break + msg = "Error retrieving Task status for {0} with Task Id: {1}".format(task_name, task_id) + return {task_id: {"msg": msg, "status": None}} # Check if the elapsed time exceeds the timeout - if self.exit_while_loop(start_time, task_id, task_name, response): - break + if time.time() - start_time > self.params.get("dnac_api_task_timeout"): + msg = "Task {0} with task id {1} has not completed within the timeout period.".format(task_name, task_id) + return {task_id: {"msg": msg, "status": "Timedout"}} # Handle error if task execution encounters an error if response.get("isError"): - failure_reason = response.get("failureReason") - self.handle_error(task_name, mgmt_ip_instance_id_map, failure_reason) - break + msg = "Task {0} with task id {1} has encountered an Error: {2}".format(task_name, task_id, response.get("failureReason")) + return {task_id: {"msg": msg, "status": "Error"}} # Check if task completed successfully - elif not response.get("isError") and "success" in response.get("progress").lower(): - # Task completed successfully - self.msg = "{0} has completed successfully on device(s): {1}".format(task_name, ', '.join(list(mgmt_ip_instance_id_map.keys()))) + if not response.get("isError") and "success" in response.get("progress").lower(): + msg = "{0} has completed successfully on device(s): {1}".format(task_name, ", ".join(device_ids)) + return {task_id: {"msg": msg, "status": "Success"}} - # Retrieve and modify compliance check details - compliance_report = self.get_compliance_report(self.want.get("run_compliance_params"), mgmt_ip_instance_id_map) + # Check if task failed + if "failed" in response.get("progress").lower(): + msg = "Failed to {0} on the following device(s): {1}".format(task_name, ", ".join(device_ids)) + return {task_id: {"msg": msg, "status": "Failed"}} - # Update result with modified response - self.update_result("success", True, self.msg, "INFO", compliance_report) - break + def get_batches_result(self, batches_dict): + """ + Retrieves the results of compliance check tasks for a list of device batches. + Parameters: + batches_dict (dict): A dictionary where each key is a batch index and the value is a dictionary + containing 'task_id' and 'batch_params'. + Returns: + list: A list of dictionaries where each dictionary contains the 'task_id', 'batch_params', + 'task_status', and 'msg' for each batch. + Description: + This function iterates over the provided batches, retrieves the task status for each batch, + and stores the result including task ID, batch parameters, task status, and message. + """ + batches_result = [] + for idx, batch_info in batches_dict.items(): + task_id = batch_info["task_id"] + device_ids = batch_info["batch_params"]["deviceUuids"] + + # Get task status for the current batch + task_status = self.get_task_result(task_id, device_ids) + self.log("The task status of batch: {0} with task id: {1} is {2}".format(idx, task_id, task_status), "INFO") + + # Extract message and status from the task status result + msg = task_status[task_id]["msg"] + status = task_status[task_id]["status"] + + # Store the result for the current batch + batch_result = { + "task_id": task_id, + "batch_params": batch_info["batch_params"], + "task_status": status, + "msg": msg + } + + # Append the current batch result to the batches_result list + batches_result.append(batch_result) + + self.log("Collective result of all batches: {0}".format(batches_result), "DEBUG") + return batches_result + + def validate_batch_result(self, batches_result, retried_batches=None): + """ + Validates the results of compliance check tasks for device batches. + Parameters: + batches_status (list): A list of dictionaries where each dictionary contains 'task_id', + 'batch_params', 'task_status', and 'msg' for each batch. + Returns: + list: A list of device IDs that have successfully completed the compliance check. + Description: + This function iterates over the provided batches status, checks the task status for each batch, + and collects the device IDs for batches that have completed successfully. For batches that failed, + it re-runs the compliance check with a batch size of 1, validates the results recursively, and collects + the successful device IDs. + """ - # Check if task failed - elif "failed" in response.get("progress").lower(): - self.msg = "Failed to {0} on the following device(s): {1}".format(task_name, list(mgmt_ip_instance_id_map.keys())) - self.update_result("failed", False, self.msg, "CRITICAL") - break + if retried_batches is None: + retried_batches = set() + successful_devices = [] + + # Iterate over each batch in the batches_status list + for batch in batches_result: + task_status = batch.get("task_status") + batch_params = batch.get("batch_params") + device_ids = tuple(batch_params.get("deviceUuids")) + + # Check if the task status is successful + if task_status == "Success": + successful_devices.extend(device_ids) + else: + # Check if the batch has already been retried with batch size of 1 + if device_ids in retried_batches: + self.log("Batch for device(s) {0} has already been retried with batch size of 1 and failed. Stopping recursion.".format(", ".join(device_ids)), "ERROR") + continue + + self.log("Re-running compliance check for batch {0} with batch_result: {1} ".format(batch, batches_result), "WARNING") + # Re-run the compliance check for the failed batch with batch size of 1 + retried_batches.add(device_ids) + batches_dict = self.run_compliance(batch_params, batch_size=1) + batches_result = self.get_batches_result(batches_dict) + + # Recursively validate the batch results and append the successful device IDs + successful_devices.extend(self.validate_batch_result(batches_result, retried_batches=retried_batches)) + + return successful_devices + + def get_compliance_task_status(self, batches_dict, mgmt_ip_instance_id_map): + """ + Retrieves and processes compliance check task statuses for multiple batches. + Parameters: + batches_dict (dict): A dictionary containing information about each batch of compliance tasks. + mgmt_ip_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. + Returns: + self + Description: + This function processes the compliance check statuses for multiple batches of devices. It determines + which devices were successful and which were unsuccessful. If any batches were successful, it logs + the success message, updates the result, and retrieves compliance reports. If all batches failed, + it logs the failure message and updates the result accordingly. + """ + + task_name = "Run Compliance Check" + batches_result = self.get_batches_result(batches_dict) + successful_devices = self.validate_batch_result(batches_result) + self.log("{0} successful on device(s): {1}".format(task_name, ", ".join(successful_devices)), "DEBUG") + + # Reverse the mgmt_ip_instance_id_map to map device IDs to IPs + id_to_ip_map = {v: k for k, v in mgmt_ip_instance_id_map.items()} + + # Determine unsuccessful devices + all_device_ids = [device_id for batch in batches_dict.values() for device_id in batch["batch_params"]["deviceUuids"]] + unsuccessful_devices = list(set(all_device_ids) - set(successful_devices)) + unsuccessful_ips = [id_to_ip_map[device_id] for device_id in unsuccessful_devices if device_id in id_to_ip_map] + self.log("{0} unsuccessful on device(s): {1}".format(task_name, ", ".join(unsuccessful_devices)), "DEBUG") + + if successful_devices: + + successful_ips = [id_to_ip_map[device_id] for device_id in successful_devices if device_id in id_to_ip_map] + self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(successful_ips), ", ".join(successful_ips)) + + if unsuccessful_ips: + msg = "{0} was unsuccessful on {1} device(s): {2}".format(task_name, len(unsuccessful_ips), ", ".join(unsuccessful_ips)) + self.log(msg, "ERROR") + self.msg += "and was unsuccessful on {0} device(s): {1}".format(len(unsuccessful_ips), ", ".join(unsuccessful_ips)) + + successful_devices_params = self.want.get("run_compliance_params").copy() + successful_devices_params["deviceUuids"] = successful_devices + compliance_report = self.get_compliance_report(successful_devices_params, mgmt_ip_instance_id_map) + self.log("Compliance Report: {0}".format(compliance_report), "INFO") + self.update_result("success", True, self.msg, "INFO", compliance_report) + else: + self.msg = "Failed to {0} on the following device(s): {1}".format(task_name, ", ".join(unsuccessful_ips)) + self.update_result("failed", False, self.msg, "CRITICAL") return self @@ -1377,9 +1449,13 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): self.handle_error(task_name, mgmt_ip_instance_id_map, failure_reason) break + sync_device_config_params = self.want.get("sync_device_config_params") + for item in response[1:]: progress = item["progress"] - for ip, device_id in mgmt_ip_instance_id_map.items(): + for device_id in sync_device_config_params["deviceId"]: + # Get IP from mgmt_ip_instance_id_map + ip = next((k for k, v in mgmt_ip_instance_id_map.items() if v == device_id), None) if device_id in progress and "copy_Running_To_Startup=Success" in progress: success_devices.append(ip) self.log("{0} operation completed successfully on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") @@ -1391,24 +1467,22 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): failed_devices = set(failed_devices) # Check conditions and print messages accordingly - if len(set(success_devices)) == len(mgmt_ip_instance_id_map): - self.msg = "{0} has completed successfully on device(s): {1}".format(task_name, success_devices) + total_devices = len(sync_device_config_params["deviceId"]) + if len(success_devices) == total_devices: + self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(success_devices), ", ".join(success_devices)) self.update_result("success", True, self.msg, "INFO") break - elif (failed_devices and - len(success_devices) < len(mgmt_ip_instance_id_map) and - len(failed_devices) + len(success_devices) == len(mgmt_ip_instance_id_map)): - self.msg = "{0} task has failed on device(s): {1} and succeeded on device(s): {2}".format( - task_name, failed_devices, success_devices) + elif failed_devices and len(failed_devices) + len(success_devices) == total_devices: + self.msg = "{0} task has failed on {1} device(s): {2} and succeeded on {3} device(s): {4}".format( + task_name, len(failed_devices), ", ".join(failed_devices), len(success_devices), ", ".join(success_devices)) self.update_result("failed", True, self.msg, "CRITICAL") break - elif len(failed_devices) == len(mgmt_ip_instance_id_map): - self.msg = "{0} task has failed on device(s): {1}".format(task_name, failed_devices) + elif len(failed_devices) == total_devices: + self.msg = "{0} task has failed on {1} device(s): {2}".format(task_name, len(failed_devices), ", ".join(failed_devices)) self.update_result("failed", False, self.msg, "CRITICAL") break return self - def get_diff_merged(self): """ This method is designed to Perform Network Compliance Actions in Cisco Catalyst Center. @@ -1416,8 +1490,9 @@ def get_diff_merged(self): Returns: self (object): An instance of a class used for interacting with Cisco Catalyst Center. Description: - This method orchestrates compliance check operation and device configuration synchronization tasks specified in a playbook. - It ensures all required tasks are present, executes them, and checks their status, facilitating smooth playbook execution. + This method orchestrates compliance check operation and device configuration synchronization tasks + specified in a playbook. It ensures all required tasks are present, executes them, and checks their + status, facilitating smooth playbook execution. """ # Action map for different network compliance operations @@ -1431,8 +1506,14 @@ def get_diff_merged(self): # Execute the action and check its status if self.want.get(action_param): - result_task_id = action_func(self.want.get(action_param)) - self.log("Performing {0}".format(action_func.__name__), "DEBUG") + if action_param == "run_compliance_params": + self.log("Performing '{0}' operation...".format(action_func.__name__), "DEBUG") + batch_size = self.want.get("run_compliance_batch_size") + result_task_id = action_func(self.want.get(action_param), batch_size=batch_size) + else: + self.log("Performing '{0}' operation...".format(action_func.__name__), "DEBUG") + result_task_id = action_func(self.want.get(action_param)) + if not result_task_id: self.msg = "An error occurred while retrieving the task_id of the {0} operation.".format(action_func.__name__) self.update_result("failed", False, self.msg, "CRITICAL") @@ -1441,6 +1522,7 @@ def get_diff_merged(self): return self + def verify_diff_merged(self, config): """ Verify the success of the "Sync Device Configuration" operation. @@ -1460,37 +1542,54 @@ def verify_diff_merged(self, config): self.log("Compliance details before running sync_device_config: {0}".format(compliance_details_before), "INFO") # Get compliance details after running sync_device_config - response = self.get_compliance_detail(self.want.get("compliance_detail_params_sync")) - if not response: + compliance_details_after = self.get_compliance_report( + self.want.get("compliance_detail_params_sync"), + self.want.get("mgmt_ip_instance_id_map") + ) + if not compliance_details_after: self.msg = "Error occured when Retrieving Compliance Details after for verifying configuration." self.update("failed", False, self.msg, "ERROR") self.check_return_status() - compliance_details_after = self.modify_compliance_response(response, self.want.get("mgmt_ip_instance_id_map")) self.log("Compliance details after running sync_device_config: {0}.".format(compliance_details_after), "INFO") + # Get the device IDs to check + sync_device_ids = self.want.get("sync_device_config_params").get("deviceId", []) + if not sync_device_ids: + self.log("No device IDs found in sync_device_config_params, Sync Device Configuration " + "operation may not have been performed.", + "WARNING") + return self + + # Initialize the status lists all_statuses_before = [] all_statuses_after = [] - for ip_address, compliance_type in compliance_details_before.items(): - status = compliance_type[0]["status"] - all_statuses_before.append(status) - - if len(set(all_statuses_before)) == 1 and all_statuses_before[0] == "NON_COMPLIANT": - for ip_address, compliance_type in compliance_details_after.items(): - status = compliance_type[0]["status"] - all_statuses_after.append(status) - if len(set(all_statuses_after)) == 1 and all_statuses_after[0] == "COMPLIANT": - self.log("Verified the success of the Sync Device Configuration operation.") - else: - self.log( - "Sync Device Configuration operation may have been unsuccessful " - "since not all devices have 'COMPLIANT' status after the operation.", - "WARNING" - ) + + # Iterate over the device IDs and check their compliance status + for device_id in sync_device_ids: + # Find the corresponding IP address from the mgmt_ip_instance_id_map + ip_address = next((ip for ip, id in self.want.get("mgmt_ip_instance_id_map").items() if id == device_id), None) + if ip_address: + # Get the status before + compliance_before = compliance_details_before.get(ip_address, []) + if compliance_before: + all_statuses_before.append(compliance_before[0]["status"]) + + # Get the status after + compliance_after = compliance_details_after.get(ip_address, []) + if compliance_after: + all_statuses_after.append(compliance_after[0]["status"]) + + # Check if all statuses changed from "NON_COMPLIANT" to "COMPLIANT" + if (all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and + all(all_status == "COMPLIANT" for all_status in all_statuses_after)): + self.log("Verified the success of the Sync Device Configuration operation.") else: - self.log("Sync_device_config may not have been performed since devices have status other than 'NON_COMPLIANT'.", "WARNING") + self.log("Sync Device Configuration operation may have been unsuccessful " + "since not all devices have 'COMPLIANT' status after the operation.", + "WARNING") else: - self.log("Verification of configuration is not required.", "INFO") + self.log("Verification of configuration is not required for run compliance operation!", "INFO") return self From 9747e61e2767f1d2b6f95647b4412368c4ad883c Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sat, 22 Jun 2024 21:45:14 -0700 Subject: [PATCH 038/119] network compliance module - 2 bug foxes --- .../network_compliance_workflow_manager.py | 72 +++++++------------ 1 file changed, 27 insertions(+), 45 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index bc6fb56ab4..7df15c7d4c 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -371,7 +371,6 @@ def validate_input(self): If the validation is successful, it logs a success message and returns an instance of the class with the validated configuration. """ - if not self.config: self.msg = "config not available in playbook for validation" self.status = "success" @@ -416,7 +415,6 @@ def validate_ip4_address_list(self, ip_address_list): If any address is found to be invalid, it logs an error message and fails. After validating all IP addresses, it logs a success message. """ - for ip in ip_address_list: if not self.is_valid_ipv4(ip): self.msg = "IP address: {0} is not valid".format(ip) @@ -470,7 +468,6 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia if run_compliance_params: device_in_progress = set() - response = self.get_compliance_report(run_compliance_params, mgmt_ip_instance_id_map) if not response: msg = ( @@ -512,7 +509,6 @@ def site_exists(self, site_name): If the site does not exist, "site_exists" is set to False, and "site_id" is None. If an exception occurs during the site lookup, an error message is logged, and the module fails. """ - site_exists = False site_id = None response = None @@ -559,7 +555,6 @@ def get_device_ids_from_ip(self, ip_address_list): If the device is found and reachable, it extracts the device ID and maps it to the corresponding IP address. If any error occurs during the process, it logs an error message and continues to the next IP address. """ - mgmt_ip_instance_id_map = {} # Iterate through the provided list of IP addresses @@ -685,7 +680,6 @@ def get_device_id_list(self, ip_address_list, site_name): This method queries Cisco Catalyst Center to retrieve the unique device IDs associated with devices having the specified IP addresses or belonging to the specified site. """ - # Initialize a dictionary to store management IP addresses and their corresponding device IDs mgmt_ip_instance_id_map = {} @@ -762,7 +756,6 @@ def get_want(self, config): either "ip_address_list" or "site_name" and constructs parameters for running compliance checks and syncing device configurations based on the provided configuration. It also logs the desired state for reference. """ - # Initialize parameters run_compliance_params = {} sync_device_config_params = {} @@ -847,7 +840,6 @@ def get_want(self, config): # Exclude devices in the "OTHER" category from sync_device_config_params sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_uuids] - #sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_ids] msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(", ".join(excluded_device_ids)) self.log(msg, "WARNING") self.log("Updated 'sync_device_config_params' parameters: {0}".format(sync_device_config_params), "DEBUG") @@ -885,7 +877,6 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): Returns: dict: A dictionary with device management IPs as keys and lists of compliance details as values. """ - # Initialize the lists/dicts final_response = {} device_list = [] @@ -986,7 +977,6 @@ def run_compliance(self, run_compliance_params, batch_size): This method initiates a compliance check operation in Cisco DNA Center by calling the "run_compliance" function from the "compliance" family of APIs. It passes the provided parameters and updates the result accordingly. """ - # Execute the compliance check operation device_uuids = run_compliance_params.get("deviceUuids") batches_dict = {} @@ -1079,7 +1069,6 @@ def get_task_status(self, task_id, task_name): This method makes an API call to retrieve the task status and logs the status information. If an error occurs during the API call, it will be caught and logged. """ - # Make an API call to retrieve the task tree try: response = self.dnac_apply["exec"]( @@ -1115,7 +1104,6 @@ def get_task_tree(self, task_id, task_name): This method makes an API call to retrieve the task status and logs the status information. If an error occurs during the API call, it will be caught and logged. """ - # Make an API call to retrieve the task status try: response = self.dnac_apply["exec"]( @@ -1153,7 +1141,6 @@ def update_result(self, status, changed, msg, log_level, data=None): - If the status is "failed", the "failed" key in the result dictionary will be set to True. - If data is provided, it will be included in the result dictionary. """ - # Update the result attributes with the provided values self.status = status self.result["status"] = status @@ -1184,7 +1171,6 @@ def exit_while_loop(self, start_time, task_id, task_name, response): Returns: bool: True if the elapsed time exceeds the timeout period, False otherwise. """ - # If the elapsed time exceeds the timeout period if time.time() - start_time > self.params.get("dnac_api_task_timeout"): if response.get("data"): @@ -1212,7 +1198,6 @@ def handle_error(self, task_name, mgmt_ip_instance_id_map, failure_reason=None): Returns: self (object): An instance of the class used for interacting with Cisco Catalyst Center. """ - # If failure reason is provided, include it in the error message if failure_reason: self.msg = "An error occurred while performing {0} on device(s): {1}. The operation failed due to the following reason: {2}".format( @@ -1243,7 +1228,6 @@ def get_task_result(self, task_id, device_ids): If there is an error during task execution, it returns the error message and status. If the task fails, it returns the failure message and status. """ - task_name = "Run Compliance Check" start_time = time.time() @@ -1290,27 +1274,27 @@ def get_batches_result(self, batches_dict): """ batches_result = [] for idx, batch_info in batches_dict.items(): - task_id = batch_info["task_id"] - device_ids = batch_info["batch_params"]["deviceUuids"] - - # Get task status for the current batch - task_status = self.get_task_result(task_id, device_ids) - self.log("The task status of batch: {0} with task id: {1} is {2}".format(idx, task_id, task_status), "INFO") - - # Extract message and status from the task status result - msg = task_status[task_id]["msg"] - status = task_status[task_id]["status"] - - # Store the result for the current batch - batch_result = { - "task_id": task_id, - "batch_params": batch_info["batch_params"], - "task_status": status, - "msg": msg - } + task_id = batch_info["task_id"] + device_ids = batch_info["batch_params"]["deviceUuids"] + + # Get task status for the current batch + task_status = self.get_task_result(task_id, device_ids) + self.log("The task status of batch: {0} with task id: {1} is {2}".format(idx, task_id, task_status), "INFO") + + # Extract message and status from the task status result + msg = task_status[task_id]["msg"] + status = task_status[task_id]["status"] + + # Store the result for the current batch + batch_result = { + "task_id": task_id, + "batch_params": batch_info["batch_params"], + "task_status": status, + "msg": msg + } - # Append the current batch result to the batches_result list - batches_result.append(batch_result) + # Append the current batch result to the batches_result list + batches_result.append(batch_result) self.log("Collective result of all batches: {0}".format(batches_result), "DEBUG") return batches_result @@ -1329,7 +1313,6 @@ def validate_batch_result(self, batches_result, retried_batches=None): it re-runs the compliance check with a batch size of 1, validates the results recursively, and collects the successful device IDs. """ - if retried_batches is None: retried_batches = set() successful_devices = [] @@ -1346,7 +1329,11 @@ def validate_batch_result(self, batches_result, retried_batches=None): else: # Check if the batch has already been retried with batch size of 1 if device_ids in retried_batches: - self.log("Batch for device(s) {0} has already been retried with batch size of 1 and failed. Stopping recursion.".format(", ".join(device_ids)), "ERROR") + self.log( + "Batch for device(s) {0} has already been retried with batch size of 1 and failed. " + "Stopping recursion.".format(", ".join(device_ids)), + "ERROR" + ) continue self.log("Re-running compliance check for batch {0} with batch_result: {1} ".format(batch, batches_result), "WARNING") @@ -1357,7 +1344,6 @@ def validate_batch_result(self, batches_result, retried_batches=None): # Recursively validate the batch results and append the successful device IDs successful_devices.extend(self.validate_batch_result(batches_result, retried_batches=retried_batches)) - return successful_devices def get_compliance_task_status(self, batches_dict, mgmt_ip_instance_id_map): @@ -1374,7 +1360,6 @@ def get_compliance_task_status(self, batches_dict, mgmt_ip_instance_id_map): the success message, updates the result, and retrieves compliance reports. If all batches failed, it logs the failure message and updates the result accordingly. """ - task_name = "Run Compliance Check" batches_result = self.get_batches_result(batches_dict) successful_devices = self.validate_batch_result(batches_result) @@ -1423,7 +1408,6 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): If all devices are already compliant, it logs a success message. If some devices have unexpected statuses, it logs an error. It continuously checks the task status until completion, updating the result accordingly. """ - task_name = "Sync Device Configuration" start_time = time.time() @@ -1490,11 +1474,9 @@ def get_diff_merged(self): Returns: self (object): An instance of a class used for interacting with Cisco Catalyst Center. Description: - This method orchestrates compliance check operation and device configuration synchronization tasks - specified in a playbook. It ensures all required tasks are present, executes them, and checks their - status, facilitating smooth playbook execution. + This method orchestrates compliance check operation and device configuration synchronization tasks specified in a playbook. + It ensures all required tasks are present, executes them, and checks their status, facilitating smooth playbook execution. """ - # Action map for different network compliance operations action_map = { "run_compliance_params": (self.run_compliance, self.get_compliance_task_status), From 2e721b52b0beddc0c9ccc0a76cc3c3ea2a78e357 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sat, 22 Jun 2024 23:22:42 -0700 Subject: [PATCH 039/119] network compliance module - 2 bug foxes --- .../network_compliance_workflow_manager.py | 28 +++++++++++-------- 1 file changed, 16 insertions(+), 12 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 7df15c7d4c..b0937efd44 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -349,7 +349,6 @@ def __init__(self, module): Returns: The method does not return a value. """ - super().__init__(module) def validate_input(self): @@ -1052,8 +1051,10 @@ def sync_device_config(self, sync_device_config_params): # Log the error if an exception occurs during the API call except Exception as e: - self.msg = ("Error occurred while synchronizing device configuration for parameters - {0}. " - "Error: {1}".format(sync_device_config_params, str(e))) + self.msg = ( + "Error occurred while synchronizing device configuration for parameters - {0}. " + "Error: {1}".format(sync_device_config_params, str(e)) + ) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -1333,7 +1334,7 @@ def validate_batch_result(self, batches_result, retried_batches=None): "Batch for device(s) {0} has already been retried with batch size of 1 and failed. " "Stopping recursion.".format(", ".join(device_ids)), "ERROR" - ) + ) continue self.log("Re-running compliance check for batch {0} with batch_result: {1} ".format(batch, batches_result), "WARNING") @@ -1467,6 +1468,7 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): break return self + def get_diff_merged(self): """ This method is designed to Perform Network Compliance Actions in Cisco Catalyst Center. @@ -1474,7 +1476,7 @@ def get_diff_merged(self): Returns: self (object): An instance of a class used for interacting with Cisco Catalyst Center. Description: - This method orchestrates compliance check operation and device configuration synchronization tasks specified in a playbook. + This method orchestrates compliance check operation and device configuration synchronization tasks specified in a playbook. It ensures all required tasks are present, executes them, and checks their status, facilitating smooth playbook execution. """ # Action map for different network compliance operations @@ -1504,7 +1506,6 @@ def get_diff_merged(self): return self - def verify_diff_merged(self, config): """ Verify the success of the "Sync Device Configuration" operation. @@ -1538,9 +1539,11 @@ def verify_diff_merged(self, config): # Get the device IDs to check sync_device_ids = self.want.get("sync_device_config_params").get("deviceId", []) if not sync_device_ids: - self.log("No device IDs found in sync_device_config_params, Sync Device Configuration " + self.log( + "No device IDs found in sync_device_config_params, Sync Device Configuration " "operation may not have been performed.", - "WARNING") + "WARNING" + ) return self # Initialize the status lists @@ -1556,16 +1559,17 @@ def verify_diff_merged(self, config): compliance_before = compliance_details_before.get(ip_address, []) if compliance_before: all_statuses_before.append(compliance_before[0]["status"]) - # Get the status after compliance_after = compliance_details_after.get(ip_address, []) if compliance_after: all_statuses_after.append(compliance_after[0]["status"]) # Check if all statuses changed from "NON_COMPLIANT" to "COMPLIANT" - if (all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and - all(all_status == "COMPLIANT" for all_status in all_statuses_after)): - self.log("Verified the success of the Sync Device Configuration operation.") + if ( + all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and + all(all_status == "COMPLIANT" for all_status in all_statuses_after) + ): + self.log("Verified the success of the Sync Device Configuration operation.") else: self.log("Sync Device Configuration operation may have been unsuccessful " "since not all devices have 'COMPLIANT' status after the operation.", From fa664d4c06ddc3f1e60662735e96a4d23835da73 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sat, 22 Jun 2024 23:28:23 -0700 Subject: [PATCH 040/119] network compliance module - 2 bug foxes --- .../network_compliance_workflow_manager.py | 21 +++++++++++-------- 1 file changed, 12 insertions(+), 9 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index b0937efd44..c34951fd9e 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -1012,8 +1012,10 @@ def run_compliance(self, run_compliance_params, batch_size): # Log and handle any exceptions that occur during the execution except Exception as e: - msg = ("An error occurred while executing the 'run_compliance' operation for parameters - {0}. " - "Error: {1}".format(batch_params, str(e))) + msg = ( + "An error occurred while executing the 'run_compliance' operation for parameters - {0}. " + "Error: {1}".format(batch_params, str(e)) + ) self.log(msg, "CRITICAL") return batches_dict @@ -1053,8 +1055,7 @@ def sync_device_config(self, sync_device_config_params): except Exception as e: self.msg = ( "Error occurred while synchronizing device configuration for parameters - {0}. " - "Error: {1}".format(sync_device_config_params, str(e)) - ) + "Error: {1}".format(sync_device_config_params, str(e))) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -1334,7 +1335,7 @@ def validate_batch_result(self, batches_result, retried_batches=None): "Batch for device(s) {0} has already been retried with batch size of 1 and failed. " "Stopping recursion.".format(", ".join(device_ids)), "ERROR" - ) + ) continue self.log("Re-running compliance check for batch {0} with batch_result: {1} ".format(batch, batches_result), "WARNING") @@ -1566,14 +1567,16 @@ def verify_diff_merged(self, config): # Check if all statuses changed from "NON_COMPLIANT" to "COMPLIANT" if ( - all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and + all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and all(all_status == "COMPLIANT" for all_status in all_statuses_after) ): - self.log("Verified the success of the Sync Device Configuration operation.") + self.log("Verified the success of the Sync Device Configuration operation.") else: - self.log("Sync Device Configuration operation may have been unsuccessful " + self.log( + "Sync Device Configuration operation may have been unsuccessful " "since not all devices have 'COMPLIANT' status after the operation.", - "WARNING") + "WARNING" + ) else: self.log("Verification of configuration is not required for run compliance operation!", "INFO") return self From 124eb3d7fd4937a6818d689d47d956a5a2dc525c Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Sat, 22 Jun 2024 23:32:52 -0700 Subject: [PATCH 041/119] network compliance module - 2 bug foxes --- plugins/modules/network_compliance_workflow_manager.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index c34951fd9e..8b4a3d388a 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -1015,7 +1015,7 @@ def run_compliance(self, run_compliance_params, batch_size): msg = ( "An error occurred while executing the 'run_compliance' operation for parameters - {0}. " "Error: {1}".format(batch_params, str(e)) - ) + ) self.log(msg, "CRITICAL") return batches_dict @@ -1335,7 +1335,7 @@ def validate_batch_result(self, batches_result, retried_batches=None): "Batch for device(s) {0} has already been retried with batch size of 1 and failed. " "Stopping recursion.".format(", ".join(device_ids)), "ERROR" - ) + ) continue self.log("Re-running compliance check for batch {0} with batch_result: {1} ".format(batch, batches_result), "WARNING") @@ -1570,7 +1570,7 @@ def verify_diff_merged(self, config): all(all_status == "NON_COMPLIANT" for all_status in all_statuses_before) and all(all_status == "COMPLIANT" for all_status in all_statuses_after) ): - self.log("Verified the success of the Sync Device Configuration operation.") + self.log("Verified the success of the Sync Device Configuration operation.") else: self.log( "Sync Device Configuration operation may have been unsuccessful " From 2276623a8836fd506ce99237def36c77394508ea Mon Sep 17 00:00:00 2001 From: Abinash Date: Mon, 24 Jun 2024 04:21:21 +0000 Subject: [PATCH 042/119] adding alternative of get_memebership API --- plugins/modules/provision_workflow_manager.py | 41 +++++++++++++++++-- 1 file changed, 38 insertions(+), 3 deletions(-) diff --git a/plugins/modules/provision_workflow_manager.py b/plugins/modules/provision_workflow_manager.py index 476a997fb2..74772ca02c 100644 --- a/plugins/modules/provision_workflow_manager.py +++ b/plugins/modules/provision_workflow_manager.py @@ -558,7 +558,7 @@ def get_site_type(self, site_name_hierarchy=None): ) except Exception: self.log("Exception occurred as \ - site '{0}' was not found".format(self.want.get("site_name")), "CRITICAL") + site '{0}' was not found".format(site_name_hierarchy), "CRITICAL") self.module.fail_json(msg="Site not found", response=[]) if response: @@ -616,6 +616,41 @@ def get_site_details(self, site_name_hierarchy=None): return (site_exists, site_id) def get_site_assignment(self): + """ + Tells us the whether a device is assigned to the site + + Parameters: + - self: The instance of the class containing the 'config' attribute + to be validated. + Returns: + - boolean: True if any device is associated with the site, False if no device is associated with site + + Example: + Post creation of the validated input, this method tells whether devices are associated with a site. + """ + + uuid = self.get_device_id() + self.log("Device ID of the device is {0}".format(uuid), "INFO") + try: + site_response = self.dnac_apply['exec']( + family="devices", + function='get_device_detail', + params={"search_by": uuid , + "identifier": "uuid"}, + op_modifies=True + ) + self.log("Response collectef from the ") + site_response = site_response.get("response") + if site_response.get("location"): + return True + else: + return False + except Exception as e: + msg = "Device with uuid {0} not found due to {1}".format(uuid, e) + self.log(msg, "CRITICAL") + self.module.fail_json(msg=msg) + + def get_site_assign(self): """ Fetches the details of devices assigned to a site @@ -630,9 +665,9 @@ def get_site_assignment(self): """ site_name_hierarchy = self.validated_config[0].get("site_name_hierarchy") - site_exits, site_id = self.get_site_details(site_name_hierarchy=site_name_hierarchy) + site_exists, site_id = self.get_site_details(site_name_hierarchy=site_name_hierarchy) serial_number = self.get_serial_number() - if site_exits: + if site_exists: site_response = self.dnac_apply['exec']( family="sites", function='get_membership', From 943b20b00198add2eac0d29325ca7cf54fef5231 Mon Sep 17 00:00:00 2001 From: Abinash Date: Mon, 24 Jun 2024 04:57:57 +0000 Subject: [PATCH 043/119] adding alternative of get_memebership API --- plugins/modules/provision_workflow_manager.py | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/plugins/modules/provision_workflow_manager.py b/plugins/modules/provision_workflow_manager.py index 74772ca02c..29bcec2881 100644 --- a/plugins/modules/provision_workflow_manager.py +++ b/plugins/modules/provision_workflow_manager.py @@ -615,7 +615,7 @@ def get_site_details(self, site_name_hierarchy=None): return (site_exists, site_id) - def get_site_assignment(self): + def get_site_assignment(self, uuid=None): """ Tells us the whether a device is assigned to the site @@ -629,7 +629,6 @@ def get_site_assignment(self): Post creation of the validated input, this method tells whether devices are associated with a site. """ - uuid = self.get_device_id() self.log("Device ID of the device is {0}".format(uuid), "INFO") try: site_response = self.dnac_apply['exec']( @@ -639,7 +638,7 @@ def get_site_assignment(self): "identifier": "uuid"}, op_modifies=True ) - self.log("Response collectef from the ") + self.log("Response collected from the API 'get_device_detail' {0}".format(site_response)) site_response = site_response.get("response") if site_response.get("location"): return True @@ -937,7 +936,8 @@ class instance for further use. return self else: - if self.get_site_assignment() is True: + uuid = self.get_device_id() + if self.get_site_assignment(uuid=uuid) is True: self.result["changed"] = False self.result['msg'] = "Device is already assigned to the desired site" self.result['diff'] = self.want @@ -1091,8 +1091,9 @@ def verify_diff_merged(self): device_type = self.want.get("device_type") provisioning = self.validated_config[0].get("provisioning") site_name_hierarchy = self.validated_config[0].get("site_name_hierarchy") + uuid = self.get_device_id() if provisioning is False: - if self.get_site_assignment() is True: + if self.get_site_assignment(uuid=uuid) is True: self.log("Requested device is already added to the site {0}".format(site_name_hierarchy), "INFO") else: self.log("Requested device is not added to the site {0}".format(site_name_hierarchy), "INFO") From 1d786f254a1ab662a3cbd6a71125c12beb613e85 Mon Sep 17 00:00:00 2001 From: Abinash Date: Tue, 25 Jun 2024 04:25:25 +0000 Subject: [PATCH 044/119] adding alternative of get_memebership API --- plugins/modules/provision_workflow_manager.py | 17 ++++++++--------- 1 file changed, 8 insertions(+), 9 deletions(-) diff --git a/plugins/modules/provision_workflow_manager.py b/plugins/modules/provision_workflow_manager.py index 29bcec2881..4bf256bb38 100644 --- a/plugins/modules/provision_workflow_manager.py +++ b/plugins/modules/provision_workflow_manager.py @@ -615,21 +615,20 @@ def get_site_details(self, site_name_hierarchy=None): return (site_exists, site_id) - def get_site_assignment(self, uuid=None): + def is_device_assigned_to_site(self, uuid): """ - Tells us the whether a device is assigned to the site + Checks if a device, specified by its UUID, is assigned to any site. Parameters: - self: The instance of the class containing the 'config' attribute to be validated. + - uuid (str): The UUID of the device to check for site assignment. Returns: - - boolean: True if any device is associated with the site, False if no device is associated with site + - boolean: True if the device is assigned to a site, False otherwise. - Example: - Post creation of the validated input, this method tells whether devices are associated with a site. """ - self.log("Device ID of the device is {0}".format(uuid), "INFO") + self.log("Checking site assignment for device with UUID: {0}".format(uuid), "INFO") try: site_response = self.dnac_apply['exec']( family="devices", @@ -645,7 +644,7 @@ def get_site_assignment(self, uuid=None): else: return False except Exception as e: - msg = "Device with uuid {0} not found due to {1}".format(uuid, e) + msg = "Failed to find device with UUID {0} due to: {1}".format(uuid, e) self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) @@ -937,7 +936,7 @@ class instance for further use. else: uuid = self.get_device_id() - if self.get_site_assignment(uuid=uuid) is True: + if self.is_device_assigned_to_site(uuid) is True: self.result["changed"] = False self.result['msg'] = "Device is already assigned to the desired site" self.result['diff'] = self.want @@ -1093,7 +1092,7 @@ def verify_diff_merged(self): site_name_hierarchy = self.validated_config[0].get("site_name_hierarchy") uuid = self.get_device_id() if provisioning is False: - if self.get_site_assignment(uuid=uuid) is True: + if self.is_device_assigned_to_site(uuid) is True: self.log("Requested device is already added to the site {0}".format(site_name_hierarchy), "INFO") else: self.log("Requested device is not added to the site {0}".format(site_name_hierarchy), "INFO") From 45df9c77a460d5fafbf2f410bede4c1081441f25 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 25 Jun 2024 16:22:31 +0530 Subject: [PATCH 045/119] Handle invalid site type given in playbook while creating/updating/deleting site --- plugins/modules/site_intent.py | 6 ++++++ plugins/modules/site_workflow_manager.py | 7 +++++++ 2 files changed, 13 insertions(+) diff --git a/plugins/modules/site_intent.py b/plugins/modules/site_intent.py index 63af3d1920..64dd5b9514 100644 --- a/plugins/modules/site_intent.py +++ b/plugins/modules/site_intent.py @@ -528,6 +528,12 @@ def get_site_params(self, params): typeinfo = params.get("type") site_info = {} + if typeinfo not in ["area", "building", "floor"]: + self.status = "failed" + self.msg = "Invalid site type '{0}' given in the playbook. Please select one of the type - 'area', 'building', 'floor'".format(typeinfo) + self.log(self.msg, "ERROR") + self.check_return_status() + if typeinfo == 'area': area_details = params.get('site').get('area') site_info['area'] = { diff --git a/plugins/modules/site_workflow_manager.py b/plugins/modules/site_workflow_manager.py index 1f17115b7a..42464a757d 100644 --- a/plugins/modules/site_workflow_manager.py +++ b/plugins/modules/site_workflow_manager.py @@ -524,9 +524,16 @@ def get_site_params(self, params): type. If the site type is 'floor', it ensures that the 'rfModel' parameter is stored in uppercase. """ + typeinfo = params.get("type") site_info = {} + if typeinfo not in ["area", "building", "floor"]: + self.status = "failed" + self.msg = "Invalid site type '{0}' given in the playbook. Please select one of the type - 'area', 'building', 'floor'".format(typeinfo) + self.log(self.msg, "ERROR") + self.check_return_status() + if typeinfo == 'area': area_details = params.get('site').get('area') site_info['area'] = { From 0ed2db2927235857a6c53f9e4bffcfbfeed0f833 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 25 Jun 2024 16:34:38 +0530 Subject: [PATCH 046/119] removed empty line --- plugins/modules/site_workflow_manager.py | 1 - 1 file changed, 1 deletion(-) diff --git a/plugins/modules/site_workflow_manager.py b/plugins/modules/site_workflow_manager.py index 42464a757d..4b442ef4a0 100644 --- a/plugins/modules/site_workflow_manager.py +++ b/plugins/modules/site_workflow_manager.py @@ -524,7 +524,6 @@ def get_site_params(self, params): type. If the site type is 'floor', it ensures that the 'rfModel' parameter is stored in uppercase. """ - typeinfo = params.get("type") site_info = {} From 018d0a0301b707a649cc982221a12c7d603be8ff Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Tue, 25 Jun 2024 12:38:29 -0700 Subject: [PATCH 047/119] addressed review comments - network compliance module --- .../network_compliance_workflow_manager.py | 218 ++++++++++-------- 1 file changed, 127 insertions(+), 91 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 8b4a3d388a..984aefb3fe 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -63,8 +63,12 @@ default: True run_compliance_batch_size: description: Specifies the number of devices to be included in a single batch for compliance operations. - This parameter is crucial for optimizing performance during large-scale compliance checks, as processing devices in - manageable batches enhances the speed and efficiency of the operation. + This parameter is crucial for optimizing performance during large-scale compliance checks. + By processing devices in manageable batches, the system can enhance the speed and efficiency of the operation, + reducing the overall time required and minimizing the risk of overloading system resources. + Adjusting this parameter allows for a balance between throughput and resource utilization, ensuring smooth and + effective compliance management. + Note - Having a higher value for run_compliance_batch_size may cause errors due to the increased load on the system. type: int default: 100 run_compliance_categories: @@ -420,19 +424,19 @@ def validate_ip4_address_list(self, ip_address_list): self.log(self.msg, "ERROR") self.module.fail_json(self.msg) - self.log("Successfully validated the IP address(es): {0}".format(", ".join(ip_address_list)), "DEBUG") + ip_address_list_str = ", ".join(ip_address_list) + self.log("Successfully validated the IP address(es): {0}".format(ip_address_list_str), "DEBUG") - def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_compliance, run_compliance_categories): + def validate_run_compliance_paramters(self, mgmt_ip_to_instance_id_map, run_compliance, run_compliance_categories): """ Validate and prepare parameters for running compliance checks. Parameters: - - mgmt_ip_instance_id_map (dict): A dictionary mapping management IP addresses to device instance IDs. + - mgmt_ip_to_instance_id_map (dict): A dictionary mapping management IP addresses to device instance IDs. - run_compliance (bool or None): A boolean indicating whether to run compliance checks. - run_compliance_categories (list): A list of compliance categories to check. Returns: tuple: A tuple containing two dictionaries: - run_compliance_params: Parameters for running compliance checks. - - compliance_detail_params: Parameters for compliance detail. Notes: - This method prepares parameters for running compliance checks based on the provided inputs. - If invalid categories are provided in `run_compliance_categories`, a `ValueError` is raised. @@ -448,31 +452,33 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia if run_compliance_categories: # Validate the categories provided if not all(category.upper() in valid_categories for category in run_compliance_categories): - msg = "Invalid category provided. Valid categories are {0}.".format(", ".join(valid_categories)) + valid_categories_str = ", ".join(valid_categories) + msg = "Invalid category provided. Valid categories are {0}.".format(valid_categories_str) self.log(msg, "ERROR") self.module.fail_json(msg) if run_compliance: # run_compliance_params - run_compliance_params["deviceUuids"] = list(mgmt_ip_instance_id_map.values()) + run_compliance_params["deviceUuids"] = list(mgmt_ip_to_instance_id_map.values()) run_compliance_params["triggerFull"] = False run_compliance_params["categories"] = run_compliance_categories if run_compliance: # run_compliance_params - run_compliance_params["deviceUuids"] = list(mgmt_ip_instance_id_map.values()) + run_compliance_params["deviceUuids"] = list(mgmt_ip_to_instance_id_map.values()) run_compliance_params["triggerFull"] = True # Check for devices with Compliance Status of "IN_PROGRESS" and update parameters accordingly if run_compliance_params: device_in_progress = set() - response = self.get_compliance_report(run_compliance_params, mgmt_ip_instance_id_map) + response = self.get_compliance_report(run_compliance_params, mgmt_ip_to_instance_id_map) if not response: + ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) msg = ( "Error occurred when retrieving Compliance Report to identify if there are " "devices with 'IN_PROGRESS' status. This is required on device(s): {0}" - .format(", ".join(list(mgmt_ip_instance_id_map.keys()))) + .format(ip_address_list_str) ) self.log(msg) self.module.fail_json(msg) @@ -483,11 +489,13 @@ def validate_run_compliance_paramters(self, mgmt_ip_instance_id_map, run_complia if compliance_type.get("status") == "IN_PROGRESS": device_in_progress.add(compliance_type.get("deviceUuid")) - self.log("Devices currently with a Compliance Status of 'IN_PROGRESS': {0}".format(list(device_in_progress)), "DEBUG") - + self.log( + "Number of devices with Compliance Status 'IN_PROGRESS': {0}. Device UUIDs: {1}".format( + len(device_in_progress), list(device_in_progress)),"DEBUG" + ) if device_in_progress: # Update run_compliance_params to exclude devices with 'IN_PROGRESS' status - run_compliance_params["deviceUuids"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in device_in_progress] + run_compliance_params["deviceUuids"] = [device_id for device_id in mgmt_ip_to_instance_id_map.values() if device_id not in device_in_progress] msg = "Excluding 'IN_PROGRESS' devices from compliance check. Updated run_compliance_params: {0}".format(run_compliance_params) self.log(msg, "DEBUG") @@ -554,7 +562,7 @@ def get_device_ids_from_ip(self, ip_address_list): If the device is found and reachable, it extracts the device ID and maps it to the corresponding IP address. If any error occurs during the process, it logs an error message and continues to the next IP address. """ - mgmt_ip_instance_id_map = {} + mgmt_ip_to_instance_id_map = {} # Iterate through the provided list of IP addresses for device_ip in ip_address_list: @@ -577,7 +585,7 @@ def get_device_ids_from_ip(self, ip_address_list): if device_info["reachabilityStatus"] == "Reachable": if device_info["family"] != "Unified AP": device_id = device_info["id"] - mgmt_ip_instance_id_map[device_ip] = device_id + mgmt_ip_to_instance_id_map[device_ip] = device_id else: msg = "Skipping device {0} as its family is {1}.".format(device_ip, device_info["family"]) self.log(msg, "INFO") @@ -591,12 +599,13 @@ def get_device_ids_from_ip(self, ip_address_list): except Exception as e: # Log an error message if any exception occurs during the process self.log("Error while fetching device ID for device: '{0}' from Cisco Catalyst Center: {1}".format(device_ip, str(e)), "ERROR") - if not mgmt_ip_instance_id_map: - self.msg = "No reachable devices found among the provided IP addresses: {0}".format(", ".join(ip_address_list)) + if not mgmt_ip_to_instance_id_map: + ip_address_list_str = ", ".join(ip_address_list) + self.msg = "No reachable devices found among the provided IP addresses: {0}".format(ip_address_list_str) self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) - return mgmt_ip_instance_id_map + return mgmt_ip_to_instance_id_map def get_device_ids_from_site(self, site_name, site_id): """ @@ -616,7 +625,7 @@ def get_device_ids_from_site(self, site_name, site_id): If no reachable devices are found for the specified site, it logs an error message and fails. """ - mgmt_ip_instance_id_map = {} + mgmt_ip_to_instance_id_map = {} site_params = { "site_id": site_id, @@ -642,7 +651,7 @@ def get_device_ids_from_site(self, site_name, site_id): # Check if the device is reachable if item_dict["reachabilityStatus"] == "Reachable": if item_dict["family"] != "Unified AP": - mgmt_ip_instance_id_map[item_dict["managementIpAddress"]] = item_dict["instanceUuid"] + mgmt_ip_to_instance_id_map[item_dict["managementIpAddress"]] = item_dict["instanceUuid"] else: msg = "Skipping device {0} in site {1} as its family is {2}".format( item_dict["managementIpAddress"], site_name, item_dict["family"]) @@ -659,12 +668,12 @@ def get_device_ids_from_site(self, site_name, site_id): # Log an error message if any exception occurs during the process self.log("Unable to fetch the device(s) associated to the site '{0}' due to {1}".format(site_name, str(e)), "ERROR") - if not mgmt_ip_instance_id_map: + if not mgmt_ip_to_instance_id_map: self.msg = "Reachable devices not found at Site: {0}".format(site_name) self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) - return mgmt_ip_instance_id_map + return mgmt_ip_to_instance_id_map def get_device_id_list(self, ip_address_list, site_name): """ @@ -680,30 +689,30 @@ def get_device_id_list(self, ip_address_list, site_name): specified IP addresses or belonging to the specified site. """ # Initialize a dictionary to store management IP addresses and their corresponding device IDs - mgmt_ip_instance_id_map = {} + mgmt_ip_to_instance_id_map = {} # Check if both site name and IP address list are provided if site_name: (site_exists, site_id) = self.site_exists(site_name) if site_exists: # Retrieve device IDs associated with devices in the site - site_mgmt_ip_instance_id_map = self.get_device_ids_from_site(site_name, site_id) - mgmt_ip_instance_id_map.update(site_mgmt_ip_instance_id_map) + site_mgmt_ip_to_instance_id_map = self.get_device_ids_from_site(site_name, site_id) + mgmt_ip_to_instance_id_map.update(site_mgmt_ip_to_instance_id_map) if ip_address_list: # Retrieve device IDs associated with devices having specified IP addresses - iplist_mgmt_ip_instance_id_map = self.get_device_ids_from_ip(ip_address_list) - mgmt_ip_instance_id_map.update(iplist_mgmt_ip_instance_id_map) + iplist_mgmt_ip_to_instance_id_map = self.get_device_ids_from_ip(ip_address_list) + mgmt_ip_to_instance_id_map.update(iplist_mgmt_ip_to_instance_id_map) - return mgmt_ip_instance_id_map + return mgmt_ip_to_instance_id_map - def is_sync_required(self, response, mgmt_ip_instance_id_map): + def is_sync_required(self, response, mgmt_ip_to_instance_id_map): """ Determine if synchronization of device configurations is required. Args: response (dict): A dictionary containing modified responses for each device. - mgmt_ip_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. + mgmt_ip_to_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. Returns: tuple: A tuple containing a boolean indicating whether synchronization is required @@ -720,7 +729,7 @@ def is_sync_required(self, response, mgmt_ip_instance_id_map): # Validate if sync is required self.log("Compliance Report for {0} operation for device(s) {1} : {2}".format( - task_name, list(mgmt_ip_instance_id_map.keys()), response), "INFO") + task_name, list(mgmt_ip_to_instance_id_map.keys()), response), "INFO") # Categorize the devices based on status - "COMPLIANT", "NON_COMPLIANT", "OTHER"(status other than COMPLIANT and NON_COMPLIANT) categorized_devices = {"COMPLIANT": {}, "NON_COMPLIANT": {}, "OTHER": {}} @@ -736,9 +745,12 @@ def is_sync_required(self, response, mgmt_ip_instance_id_map): self.log("Device(s) Categorized based on Compliance status: {0}".format(categorized_devices), "INFO") # Validate if all devices are "COMPLIANT" - then sync not required - if len(categorized_devices["COMPLIANT"]) + len(categorized_devices["OTHER"]) == len(mgmt_ip_instance_id_map): - msg = "Device(s): {0} are already compliant with the RUNNING_CONFIG compliance type. Therefore, {1} is not required.".format( - ", ".join(list(mgmt_ip_instance_id_map.keys())), task_name) + if len(categorized_devices["COMPLIANT"]) + len(categorized_devices["OTHER"]) == len(mgmt_ip_to_instance_id_map): + compliant_device_ips_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) + msg = ( + "Device(s) with IP address(es): {0} are already compliant with the RUNNING_CONFIG compliance type. " + "Therefore, the task '{1}' is not required." + ).format(compliant_device_ips_str, task_name) required = False return required, msg, categorized_devices @@ -790,41 +802,43 @@ def get_want(self, config): ip_address_list = list(set(ip_address_list)) # Retrieve device ID list - mgmt_ip_instance_id_map = self.get_device_id_list(ip_address_list, site_name) - if not mgmt_ip_instance_id_map: - # Log an error message if mgmt_ip_instance_id_map is empty + mgmt_ip_to_instance_id_map = self.get_device_id_list(ip_address_list, site_name) + if not mgmt_ip_to_instance_id_map: + # Log an error message if mgmt_ip_to_instance_id_map is empty + ip_address_list_str = ", ".join(ip_address_list) msg = ("No device UUIDs were fetched for network compliance operations with the provided IP address(es): {0} " - "or site name: {1}. This could be due to Unreachable devices or access points (APs).").format(", ".join(ip_address_list), site_name) + "or site name: {1}. This could be due to Unreachable devices or access points (APs).").format(ip_address_list_str, site_name) self.log(msg, "ERROR") self.module.fail_json(msg) # Run Compliance Paramters run_compliance_params = self.validate_run_compliance_paramters( - mgmt_ip_instance_id_map, run_compliance, run_compliance_categories) + mgmt_ip_to_instance_id_map, run_compliance, run_compliance_categories) # Sync Device Configuration Parameters if sync_device_config: sync_device_config_params = { - "deviceId": list(mgmt_ip_instance_id_map.values()) + "deviceId": list(mgmt_ip_to_instance_id_map.values()) } compliance_detail_params_sync = { - "deviceUuids": list(mgmt_ip_instance_id_map.values()), + "deviceUuids": list(mgmt_ip_to_instance_id_map.values()), "categories": ["RUNNING_CONFIG"] } # Validate if Sync Device Configuration is required on the device(s) - response = self.get_compliance_report(compliance_detail_params_sync, mgmt_ip_instance_id_map) + response = self.get_compliance_report(compliance_detail_params_sync, mgmt_ip_to_instance_id_map) if not response: + ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) msg = "Error occurred when retrieving Compliance Report to identify if Sync Device Config Operation " - msg += "is required on device(s): {0}".format(", ".join(list(mgmt_ip_instance_id_map.keys()))) + msg += "is required on device(s): {0}".format(ip_address_list_str) self.log(msg) self.module.fail_json(msg) compliance_details = response - required, self.msg, categorized_devices = self.is_sync_required(response, mgmt_ip_instance_id_map) - self.log("Is Sync Requied: {0} -- {1}".format(required, self.msg), "DEBUG") - if not required: + sync_required, self.msg, categorized_devices = self.is_sync_required(response, mgmt_ip_to_instance_id_map) + self.log("Is Sync Requied: {0} -- Message: {1}".format(sync_required, self.msg), "DEBUG") + if not sync_required: self.update_result("ok", False, self.msg, "INFO") self.module.exit_json(**self.result) @@ -835,11 +849,12 @@ def get_want(self, config): if excluded_device_ids: # Convert excluded_device_ids to their corresponding UUIDs - excluded_device_uuids = [mgmt_ip_instance_id_map[ip] for ip in excluded_device_ids if ip in mgmt_ip_instance_id_map] + excluded_device_uuids = [mgmt_ip_to_instance_id_map[ip] for ip in excluded_device_ids if ip in mgmt_ip_to_instance_id_map] # Exclude devices in the "OTHER" category from sync_device_config_params - sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_instance_id_map.values() if device_id not in excluded_device_uuids] - msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(", ".join(excluded_device_ids)) + sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_to_instance_id_map.values() if device_id not in excluded_device_uuids] + excluded_device_ids_str = ", ".join(excluded_device_ids) + msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(excluded_device_ids_str) self.log(msg, "WARNING") self.log("Updated 'sync_device_config_params' parameters: {0}".format(sync_device_config_params), "DEBUG") @@ -848,7 +863,7 @@ def get_want(self, config): want = dict( ip_address_list=ip_address_list, site_name=site_name, - mgmt_ip_instance_id_map=mgmt_ip_instance_id_map, + mgmt_ip_to_instance_id_map=mgmt_ip_to_instance_id_map, run_compliance_params=run_compliance_params, run_compliance_batch_size=run_compliance_batch_size, sync_device_config_params=sync_device_config_params, @@ -860,7 +875,7 @@ def get_want(self, config): return self - def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): + def get_compliance_report(self, run_compliance_params, mgmt_ip_to_instance_id_map): """ Generate a compliance report for devices based on provided parameters. @@ -871,7 +886,7 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): Args: run_compliance_params (dict): Parameters for running compliance checks. Expected to contain "deviceUuids" and optionally "categories". - mgmt_ip_instance_id_map (dict): Mapping of device management IPs to device UUIDs. + mgmt_ip_to_instance_id_map (dict): Mapping of device management IPs to device UUIDs. Returns: dict: A dictionary with device management IPs as keys and lists of compliance details as values. @@ -886,13 +901,13 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): for device_uuid in run_compliance_params["deviceUuids"]: # Find the corresponding device IP for the given device UUID - for ip, device_id in mgmt_ip_instance_id_map.items(): + for ip, device_id in mgmt_ip_to_instance_id_map.items(): if device_uuid == device_id: device_ip = ip break if device_ip is None: - self.log("Device UUID: {0} not found in mgmt_ip_instance_id_map: {1}".format(device_uuid, mgmt_ip_instance_id_map), "DEBUG") + self.log("Device UUID: {0} not found in mgmt_ip_to_instance_id_map: {1}".format(device_uuid, mgmt_ip_to_instance_id_map), "DEBUG") continue # Add the device IP to the device list @@ -921,7 +936,8 @@ def get_compliance_report(self, run_compliance_params, mgmt_ip_instance_id_map): # If no compliance details were found, update the result with an error message if not final_response: - self.msg = "No Compliance Details found for the devices: {0}".format(", ".join(device_list)) + device_list_str = ", ".join(device_list) + self.msg = "No Compliance Details found for the devices: {0}".format(device_list_str) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() @@ -967,24 +983,30 @@ def get_compliance_details_of_device(self, compliance_details_of_device_params, def run_compliance(self, run_compliance_params, batch_size): """ - Executes a compliance check operation in Cisco DNA Center. + Executes a compliance check operation in Cisco Catalyst Center. Parameters: run_compliance_params (dict): Parameters for running the compliance check. + batch_size (int): The number of devices to include in each batch. Returns: - str or None: Task ID of the API task created, or None if unsuccessful. + batches_dict: A dictionary containing task IDs and parameters for each batch, or an empty dictionary if unsuccessful Description: - This method initiates a compliance check operation in Cisco DNA Center by calling the "run_compliance" function + This method initiates a compliance check operation in Cisco Catalyst Center by calling the "run_compliance" function from the "compliance" family of APIs. It passes the provided parameters and updates the result accordingly. """ # Execute the compliance check operation device_uuids = run_compliance_params.get("deviceUuids") + if not device_uuids: + self.msg = "No device UUIDs were found for the execution of the compliance operation." + self.update_result("ok", False, self.msg, "INFO") + self.module.exit_json(**self.result) + batches_dict = {} if len(device_uuids) > batch_size: batches = [device_uuids[i:i + batch_size] for i in range(0, len(device_uuids), batch_size)] else: batches = [device_uuids] - self.log("The following batches have been created for the compliance operation: {0}".format(batches), "DEBUG") + self.log("Created {0} batch(es) for run compliance operation: {1}".format(len(batches), batches), "DEBUG") for idx, batch in enumerate(batches): self.log("Executing 'run_compliance' operation on batch: {0} - {1}".format(idx, batch), "DEBUG") @@ -1028,7 +1050,7 @@ def sync_device_config(self, sync_device_config_params): Returns: task_id (str): The ID of the task created for the synchronization operation. Note: - This method initiates the synchronization of device configurations by making an API call to the Cisco DNA Center. + This method initiates the synchronization of device configurations by making an API call to the Cisco Catalyst Center. It logs the response received from the API call and extracts the task ID from the response for further monitoring. If an error occurs during the API call, it will be caught and logged. """ @@ -1190,24 +1212,26 @@ def exit_while_loop(self, start_time, task_id, task_name, response): return False - def handle_error(self, task_name, mgmt_ip_instance_id_map, failure_reason=None): + def handle_error(self, task_name, mgmt_ip_to_instance_id_map, failure_reason=None): """ Handle error encountered during task execution. Parameters: - task_name (str): Name of the task being performed. - - mgmt_ip_instance_id_map (dict): Mapping of management IP addresses to instance IDs. + - mgmt_ip_to_instance_id_map (dict): Mapping of management IP addresses to instance IDs. - failure_reason (str, optional): Reason for the failure, if available. Returns: self (object): An instance of the class used for interacting with Cisco Catalyst Center. """ # If failure reason is provided, include it in the error message if failure_reason: + ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) self.msg = "An error occurred while performing {0} on device(s): {1}. The operation failed due to the following reason: {2}".format( - task_name, ", ".join(list(mgmt_ip_instance_id_map.keys())), failure_reason) + task_name, failure_reason) # If no failure reason is provided, generate a generic error message else: + ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) self.msg = "An error occurred while performing {0} on device(s): {1}".format( - task_name, ", ".join(list(mgmt_ip_instance_id_map.keys()))) + task_name, ip_address_list_str) # Update the result with failure status and log the error message self.update_result("failed", False, self.msg, "ERROR") @@ -1253,12 +1277,14 @@ def get_task_result(self, task_id, device_ids): # Check if task completed successfully if not response.get("isError") and "success" in response.get("progress").lower(): - msg = "{0} has completed successfully on device(s): {1}".format(task_name, ", ".join(device_ids)) + device_ids_str = ", ".join(device_ids) + msg = "{0} has completed successfully on device(s): {1}".format(task_name, device_ids_str) return {task_id: {"msg": msg, "status": "Success"}} # Check if task failed if "failed" in response.get("progress").lower(): - msg = "Failed to {0} on the following device(s): {1}".format(task_name, ", ".join(device_ids)) + device_ids_str = ", ".join(device_ids) + msg = "Failed to {0} on the following device(s): {1}".format(task_name, device_ids_str) return {task_id: {"msg": msg, "status": "Failed"}} def get_batches_result(self, batches_dict): @@ -1331,9 +1357,10 @@ def validate_batch_result(self, batches_result, retried_batches=None): else: # Check if the batch has already been retried with batch size of 1 if device_ids in retried_batches: + device_ids_str = ", ".join(device_ids) self.log( "Batch for device(s) {0} has already been retried with batch size of 1 and failed. " - "Stopping recursion.".format(", ".join(device_ids)), + "Stopping recursion.".format(device_ids_str), "ERROR" ) continue @@ -1346,14 +1373,18 @@ def validate_batch_result(self, batches_result, retried_batches=None): # Recursively validate the batch results and append the successful device IDs successful_devices.extend(self.validate_batch_result(batches_result, retried_batches=retried_batches)) + msg = ("The results of all batches have been validated, and the compliance checks " + "were successfully executed on following devices: {0}".format(successful_devices)) + self.log(msg, "DEBUG") + return successful_devices - def get_compliance_task_status(self, batches_dict, mgmt_ip_instance_id_map): + def get_compliance_task_status(self, batches_dict, mgmt_ip_to_instance_id_map): """ Retrieves and processes compliance check task statuses for multiple batches. Parameters: batches_dict (dict): A dictionary containing information about each batch of compliance tasks. - mgmt_ip_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. + mgmt_ip_to_instance_id_map (dict): A dictionary mapping management IP addresses to instance IDs. Returns: self Description: @@ -1365,44 +1396,47 @@ def get_compliance_task_status(self, batches_dict, mgmt_ip_instance_id_map): task_name = "Run Compliance Check" batches_result = self.get_batches_result(batches_dict) successful_devices = self.validate_batch_result(batches_result) - self.log("{0} successful on device(s): {1}".format(task_name, ", ".join(successful_devices)), "DEBUG") + successful_devices_str = ", ".join(successful_devices) + self.log("{0} successful on device(s): {1}".format(task_name, successful_devices_str), "DEBUG") - # Reverse the mgmt_ip_instance_id_map to map device IDs to IPs - id_to_ip_map = {v: k for k, v in mgmt_ip_instance_id_map.items()} + # Reverse the mgmt_ip_to_instance_id_map to map device IDs to IPs + id_to_ip_map = {v: k for k, v in mgmt_ip_to_instance_id_map.items()} # Determine unsuccessful devices all_device_ids = [device_id for batch in batches_dict.values() for device_id in batch["batch_params"]["deviceUuids"]] unsuccessful_devices = list(set(all_device_ids) - set(successful_devices)) unsuccessful_ips = [id_to_ip_map[device_id] for device_id in unsuccessful_devices if device_id in id_to_ip_map] - self.log("{0} unsuccessful on device(s): {1}".format(task_name, ", ".join(unsuccessful_devices)), "DEBUG") + unsuccessful_ips_str = ", ".join(unsuccessful_ips) + self.log("{0} unsuccessful on device(s): {1}".format(task_name, unsuccessful_ips_str), "DEBUG") if successful_devices: successful_ips = [id_to_ip_map[device_id] for device_id in successful_devices if device_id in id_to_ip_map] - self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(successful_ips), ", ".join(successful_ips)) + successful_ips_str = ", ".join(successful_ips) + self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(successful_ips), successful_ips_str) if unsuccessful_ips: - msg = "{0} was unsuccessful on {1} device(s): {2}".format(task_name, len(unsuccessful_ips), ", ".join(unsuccessful_ips)) + msg = "{0} was unsuccessful on {1} device(s): {2}".format(task_name, len(unsuccessful_ips), unsuccessful_ips_str) self.log(msg, "ERROR") - self.msg += "and was unsuccessful on {0} device(s): {1}".format(len(unsuccessful_ips), ", ".join(unsuccessful_ips)) + self.msg += "and was unsuccessful on {0} device(s): {1}".format(len(unsuccessful_ips), unsuccessful_ips_str) successful_devices_params = self.want.get("run_compliance_params").copy() successful_devices_params["deviceUuids"] = successful_devices - compliance_report = self.get_compliance_report(successful_devices_params, mgmt_ip_instance_id_map) + compliance_report = self.get_compliance_report(successful_devices_params, mgmt_ip_to_instance_id_map) self.log("Compliance Report: {0}".format(compliance_report), "INFO") self.update_result("success", True, self.msg, "INFO", compliance_report) else: - self.msg = "Failed to {0} on the following device(s): {1}".format(task_name, ", ".join(unsuccessful_ips)) + self.msg = "Failed to {0} on the following device(s): {1}".format(task_name, unsuccessful_ips_str) self.update_result("failed", False, self.msg, "CRITICAL") return self - def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): + def get_sync_config_task_status(self, task_id, mgmt_ip_to_instance_id_map): """ This function manages the status of device configuration synchronization tasks in Cisco Catalyst Center. Parameters: - task_id: ID of the synchronization task - - mgmt_ip_instance_id_map: Mapping of management IP addresses to instance IDs + - mgmt_ip_to_instance_id_map: Mapping of management IP addresses to instance IDs Returns: self (object): An instance of a class used for interacting with Cisco Catalyst Center. Description: @@ -1432,7 +1466,7 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): # Handle error if task execution encounters an error if response[0].get("isError"): failure_reason = response[0].get("failureReason") - self.handle_error(task_name, mgmt_ip_instance_id_map, failure_reason) + self.handle_error(task_name, mgmt_ip_to_instance_id_map, failure_reason) break sync_device_config_params = self.want.get("sync_device_config_params") @@ -1440,8 +1474,8 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): for item in response[1:]: progress = item["progress"] for device_id in sync_device_config_params["deviceId"]: - # Get IP from mgmt_ip_instance_id_map - ip = next((k for k, v in mgmt_ip_instance_id_map.items() if v == device_id), None) + # Get IP from mgmt_ip_to_instance_id_map + ip = next((k for k, v in mgmt_ip_to_instance_id_map.items() if v == device_id), None) if device_id in progress and "copy_Running_To_Startup=Success" in progress: success_devices.append(ip) self.log("{0} operation completed successfully on device: {1} with device UUID: {2}".format(task_name, ip, device_id), "DEBUG") @@ -1450,21 +1484,23 @@ def get_sync_config_task_status(self, task_id, mgmt_ip_instance_id_map): failed_devices.append(ip) success_devices = set(success_devices) + success_devices_str = ", ".join(success_devices) failed_devices = set(failed_devices) + failed_devices_str = ", ".join(failed_devices) # Check conditions and print messages accordingly total_devices = len(sync_device_config_params["deviceId"]) if len(success_devices) == total_devices: - self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(success_devices), ", ".join(success_devices)) + self.msg = "{0} has completed successfully on {1} device(s): {2}".format(task_name, len(success_devices), success_devices_str) self.update_result("success", True, self.msg, "INFO") break elif failed_devices and len(failed_devices) + len(success_devices) == total_devices: self.msg = "{0} task has failed on {1} device(s): {2} and succeeded on {3} device(s): {4}".format( - task_name, len(failed_devices), ", ".join(failed_devices), len(success_devices), ", ".join(success_devices)) + task_name, len(failed_devices), failed_devices_str, len(success_devices), success_devices_str) self.update_result("failed", True, self.msg, "CRITICAL") break elif len(failed_devices) == total_devices: - self.msg = "{0} task has failed on {1} device(s): {2}".format(task_name, len(failed_devices), ", ".join(failed_devices)) + self.msg = "{0} task has failed on {1} device(s): {2}".format(task_name, len(failed_devices), failed_devices_str) self.update_result("failed", False, self.msg, "CRITICAL") break @@ -1503,7 +1539,7 @@ def get_diff_merged(self): self.msg = "An error occurred while retrieving the task_id of the {0} operation.".format(action_func.__name__) self.update_result("failed", False, self.msg, "CRITICAL") else: - status_func(result_task_id, self.want.get("mgmt_ip_instance_id_map")).check_return_status() + status_func(result_task_id, self.want.get("mgmt_ip_to_instance_id_map")).check_return_status() return self @@ -1528,7 +1564,7 @@ def verify_diff_merged(self, config): # Get compliance details after running sync_device_config compliance_details_after = self.get_compliance_report( self.want.get("compliance_detail_params_sync"), - self.want.get("mgmt_ip_instance_id_map") + self.want.get("mgmt_ip_to_instance_id_map") ) if not compliance_details_after: self.msg = "Error occured when Retrieving Compliance Details after for verifying configuration." @@ -1553,8 +1589,8 @@ def verify_diff_merged(self, config): # Iterate over the device IDs and check their compliance status for device_id in sync_device_ids: - # Find the corresponding IP address from the mgmt_ip_instance_id_map - ip_address = next((ip for ip, id in self.want.get("mgmt_ip_instance_id_map").items() if id == device_id), None) + # Find the corresponding IP address from the mgmt_ip_to_instance_id_map + ip_address = next((ip for ip, id in self.want.get("mgmt_ip_to_instance_id_map").items() if id == device_id), None) if ip_address: # Get the status before compliance_before = compliance_details_before.get(ip_address, []) From 0791ecdd6953d704a01ca5c2166d3ad61f8fc734 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Tue, 25 Jun 2024 12:59:12 -0700 Subject: [PATCH 048/119] addressed review comments - network compliance module --- .../network_compliance_workflow_manager.py | 18 ++++++++++++------ 1 file changed, 12 insertions(+), 6 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 984aefb3fe..a4fcb8ed62 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -491,7 +491,7 @@ def validate_run_compliance_paramters(self, mgmt_ip_to_instance_id_map, run_comp self.log( "Number of devices with Compliance Status 'IN_PROGRESS': {0}. Device UUIDs: {1}".format( - len(device_in_progress), list(device_in_progress)),"DEBUG" + len(device_in_progress), list(device_in_progress)), "DEBUG" ) if device_in_progress: # Update run_compliance_params to exclude devices with 'IN_PROGRESS' status @@ -852,7 +852,10 @@ def get_want(self, config): excluded_device_uuids = [mgmt_ip_to_instance_id_map[ip] for ip in excluded_device_ids if ip in mgmt_ip_to_instance_id_map] # Exclude devices in the "OTHER" category from sync_device_config_params - sync_device_config_params["deviceId"] = [device_id for device_id in mgmt_ip_to_instance_id_map.values() if device_id not in excluded_device_uuids] + sync_device_config_params["deviceId"] = [ + device_id for device_id in mgmt_ip_to_instance_id_map.values() + if device_id not in excluded_device_uuids + ] excluded_device_ids_str = ", ".join(excluded_device_ids) msg = "Skipping these devices because their compliance status is not 'NON_COMPLIANT': {0}".format(excluded_device_ids_str) self.log(msg, "WARNING") @@ -1223,13 +1226,12 @@ def handle_error(self, task_name, mgmt_ip_to_instance_id_map, failure_reason=Non self (object): An instance of the class used for interacting with Cisco Catalyst Center. """ # If failure reason is provided, include it in the error message + ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) if failure_reason: - ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) self.msg = "An error occurred while performing {0} on device(s): {1}. The operation failed due to the following reason: {2}".format( - task_name, failure_reason) + task_name, ip_address_list_str, failure_reason) # If no failure reason is provided, generate a generic error message else: - ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) self.msg = "An error occurred while performing {0} on device(s): {1}".format( task_name, ip_address_list_str) @@ -1403,7 +1405,11 @@ def get_compliance_task_status(self, batches_dict, mgmt_ip_to_instance_id_map): id_to_ip_map = {v: k for k, v in mgmt_ip_to_instance_id_map.items()} # Determine unsuccessful devices - all_device_ids = [device_id for batch in batches_dict.values() for device_id in batch["batch_params"]["deviceUuids"]] + all_device_ids = [ + device_id + for batch in batches_dict.values() + for device_id in batch["batch_params"]["deviceUuids"] + ] unsuccessful_devices = list(set(all_device_ids) - set(successful_devices)) unsuccessful_ips = [id_to_ip_map[device_id] for device_id in unsuccessful_devices if device_id in id_to_ip_map] unsuccessful_ips_str = ", ".join(unsuccessful_ips) From 5a9aeaa54c5f926e9d1cb8e58b08fad586d8ea6c Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Tue, 25 Jun 2024 13:02:25 -0700 Subject: [PATCH 049/119] addressed review comments - network compliance module --- plugins/modules/network_compliance_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index a4fcb8ed62..4fff1b6a83 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -1412,7 +1412,7 @@ def get_compliance_task_status(self, batches_dict, mgmt_ip_to_instance_id_map): ] unsuccessful_devices = list(set(all_device_ids) - set(successful_devices)) unsuccessful_ips = [id_to_ip_map[device_id] for device_id in unsuccessful_devices if device_id in id_to_ip_map] - unsuccessful_ips_str = ", ".join(unsuccessful_ips) + unsuccessful_ips_str = ", ".join(unsuccessful_ips) self.log("{0} unsuccessful on device(s): {1}".format(task_name, unsuccessful_ips_str), "DEBUG") if successful_devices: From bd393b348c4dd78e9945ad7a6740604f30f2980d Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 26 Jun 2024 20:00:49 +0530 Subject: [PATCH 050/119] Fix the issue of removing header while configuring webhook destination --- ...ents_and_notifications_workflow_manager.py | 45 +++++++++++++++++-- 1 file changed, 41 insertions(+), 4 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 106623a3a2..b9b486dbf3 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1871,7 +1871,9 @@ def collect_webhook_playbook_params(self, webhook_details): 'isProxyRoute': webhook_details.get('is_proxy_route') } - if webhook_details.get('headers'): + if webhook_details.get("headers") == []: + playbook_params['headers'] = [] + elif webhook_details.get('headers'): custom_header = webhook_details['headers'] playbook_params['headers'] = [] for header in custom_header: @@ -1938,6 +1940,41 @@ def add_webhook_destination(self, webhook_params): return self + def webhook_header_needs_update(self, playbook_header, ccc_header): + """ + Determines if an update is needed by comparing two lists of dictionaries based on the 'name' and 'value' keys. + Args: + self (object): An instance of a class used for interacting with Cisco Catalyst Center. + playbook_header (list of dict): The first list of dictionaries for headers given in the playbook. Each dictionary + should contain 'name' and 'value' keys. + ccc_header (list of dict): The second list of dictionaries for headers present in the Cisco Catalyst Center. + Each dictionary should contain 'name' and 'value' keys, and may contain additional keys. + Returns: + bool: True if an update is needed, False otherwise. + Description: + This function checks whether an update is required by comparing two lists of dictionaries. + It first checks for simple cases where one list is empty and the other is not. + If neither of these cases applies, it converts both lists into dictionaries + with the 'name' keys as dictionary keys and 'value' keys as dictionary values. + It then compares these dictionaries to determine if they are identical. + If they are not identical, it sets the update_needed flag to True. + """ + + update_needed = False + + if playbook_header == [] and ccc_header: + update_needed = True + elif playbook_header and not ccc_header: + update_needed = True + else: + playbook_dict = {item['name']: item['value'] for item in playbook_header} + ccc_dict = {item['name']: item['value'] for item in ccc_header} + + if not playbook_dict == ccc_dict: + update_needed = True + + return update_needed + def webhook_dest_needs_update(self, webhook_params, webhook_dest_detail_in_ccc): """ Check if updates are needed for a webhook destination in Cisco Catalyst Center. @@ -1959,7 +1996,7 @@ def webhook_dest_needs_update(self, webhook_params, webhook_dest_detail_in_ccc): for key, value in webhook_params.items(): if isinstance(value, list): - update_needed = self.webhook_dest_needs_update(value[0], webhook_dest_detail_in_ccc[key][0]) + update_needed = self.webhook_header_needs_update(value, webhook_dest_detail_in_ccc[key]) if update_needed: break elif webhook_dest_detail_in_ccc[key] == value or value is None: @@ -2006,8 +2043,8 @@ def update_webhook_destination(self, webhook_params, webhook_dest_detail_in_ccc) if update_webhook_params.get("isProxyRoute") is None: update_webhook_params["isProxyRoute"] = webhook_dest_detail_in_ccc.get('isProxyRoute') - if not update_webhook_params['headers'] and webhook_dest_detail_in_ccc.get('headers'): - update_webhook_params['headers'] = webhook_dest_detail_in_ccc.get('headers')[0] + if update_webhook_params['headers'] != [] and not update_webhook_params['headers'] and webhook_dest_detail_in_ccc.get('headers'): + update_webhook_params['headers'] = webhook_dest_detail_in_ccc.get('headers') response = self.dnac._exec( family="event_management", From df9038027fd23223ba9759177be514761fae8e67 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Thu, 27 Jun 2024 15:51:06 +0530 Subject: [PATCH 051/119] update the url regex to must start with https:// and addressed review comments --- .../modules/events_and_notifications_workflow_manager.py | 7 +++---- 1 file changed, 3 insertions(+), 4 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index b9b486dbf3..d7e84e16e1 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1962,7 +1962,7 @@ def webhook_header_needs_update(self, playbook_header, ccc_header): update_needed = False - if playbook_header == [] and ccc_header: + if len(playbook_header) == 0 and ccc_header: update_needed = True elif playbook_header and not ccc_header: update_needed = True @@ -1970,8 +1970,7 @@ def webhook_header_needs_update(self, playbook_header, ccc_header): playbook_dict = {item['name']: item['value'] for item in playbook_header} ccc_dict = {item['name']: item['value'] for item in ccc_header} - if not playbook_dict == ccc_dict: - update_needed = True + return playbook_dict != ccc_dict return update_needed @@ -4527,7 +4526,7 @@ def get_diff_merged(self, config): url = webhook_params.get('url') regex_pattern = re.compile( - r'^(https?:\/\/)?' # protocol + r'^https:\/\/' # ensure the URL starts with https:// r'((([a-z\d]([a-z\d-]*[a-z\d])*)\.)+[a-z]{2,}|' # domain name r'((\d{1,3}\.){3}\d{1,3})|' # OR IPv4 address r'(\[[0-9a-fA-F:.]+\]))' # OR IPv6 address From b77e86e67b49f86ed38baf89b90f04dcb173ed4d Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 28 Jun 2024 14:40:45 +0530 Subject: [PATCH 052/119] Fix the issue of getting devices using 'get_device_list' for scaled set up in inventory and swim workflow manager --- plugins/modules/inventory_intent.py | 55 +++++++++---- plugins/modules/inventory_workflow_manager.py | 58 ++++++++++---- plugins/modules/swim_intent.py | 80 ++++++++++++------- plugins/modules/swim_workflow_manager.py | 80 ++++++++++++------- 4 files changed, 183 insertions(+), 90 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index cada74a18b..a12a4480df 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -876,25 +876,46 @@ def device_exists_in_dnac(self): The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ - device_in_dnac = [] + device_in_dnac = set() + offset = 0 + limit = 500 + initial_exec = False - try: - response = self.dnac._exec( - family="devices", - function='get_device_list', - ) + while True: + try: + if initial_exec: + response = self.dnac._exec( + family="devices", + function='get_device_list', + params={ + "offset": offset * limit, + "limit": limit + } + ) + else: + response = self.dnac._exec( + family="devices", + function='get_device_list', + ) + initial_exec = True + offset = offset + 1 + response = response.get("response") + if not response: + self.log("There is no device details present in Cisco Catalyst Center", "INFO") + break - except Exception as e: - error_message = "Error while fetching device from Cisco Catalyst Center: {0}".format(str(e)) - self.log(error_message, "CRITICAL") - raise Exception(error_message) + self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") + for ip in response: + device_ip = ip["managementIpAddress"] + device_in_dnac.add(device_ip) - if response: - self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") - response = response.get("response") - for ip in response: - device_ip = ip["managementIpAddress"] - device_in_dnac.append(device_ip) + except Exception as e: + self.status = "failed" + self.msg = "Error while fetching device details from Cisco Catalyst Center: {0}".format(str(e)) + self.log(self.msg, "CRITICAL") + self.check_return_status() + self.log("Devices present in Cisco Catalyst Center are : {0}".format(str(device_in_dnac)), "DEBUG") + device_in_dnac = list(device_in_dnac) return device_in_dnac @@ -2847,7 +2868,7 @@ def is_device_exist_for_update(self, device_to_update): # First check if device present in Cisco Catalyst Center or not device_exist = False for device in device_to_update: - if device in self.have.get("device_in_ccc"): + if device in self.have.get("device_in_dnac"): device_exist = True break diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 9af856ba64..60111a530d 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -875,25 +875,47 @@ def device_exists_in_ccc(self): The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ - device_in_ccc = [] + device_in_ccc = set() + offset = 0 + limit = 500 + initial_exec = False - try: - response = self.dnac._exec( - family="devices", - function='get_device_list', - ) + while True: + try: + if initial_exec: + response = self.dnac._exec( + family="devices", + function='get_device_list', + params={ + "offset": offset * limit, + "limit": limit + } + ) + else: + response = self.dnac._exec( + family="devices", + function='get_device_list', + ) + initial_exec = True + offset = offset + 1 + response = response.get("response") + if not response: + self.log("There is no device details present in Cisco Catalyst Center", "INFO") + break - except Exception as e: - error_message = "Error while fetching device from Cisco Catalyst Center: {0}".format(str(e)) - self.log(error_message, "CRITICAL") - raise Exception(error_message) + self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") + for ip in response: + device_ip = ip["managementIpAddress"] + device_in_ccc.add(device_ip) - if response: - self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") - response = response.get("response") - for ip in response: - device_ip = ip["managementIpAddress"] - device_in_ccc.append(device_ip) + except Exception as e: + self.status = "failed" + self.msg = "Error while fetching device details from Cisco Catalyst Center: {0}".format(str(e)) + self.log(self.msg, "CRITICAL") + self.check_return_status() + + self.log("Devices present in Cisco Catalyst Center are : {0}".format(str(device_in_ccc)), "DEBUG") + device_in_ccc = list(device_in_ccc) return device_in_ccc @@ -3465,6 +3487,7 @@ def get_diff_deleted(self, config): op_modifies=True, params=provision_params, ) + self.log("Received API response from 'get_provisioned_wired_device': {0}".format(str(prov_respone)), "DEBUG") if prov_respone.get("status") == "success": response = self.dnac._exec( @@ -3473,13 +3496,14 @@ def get_diff_deleted(self, config): op_modifies=True, params=provision_params, ) + self.log("Received API response from 'delete_provisioned_wired_device': {0}".format(str(response)), "DEBUG") executionid = response.get("executionId") while True: execution_details = self.get_execution_details(executionid) if execution_details.get("status") == "SUCCESS": self.result['changed'] = True - self.msg = execution_details.get("bapiName") + self.msg = "Delete provisioned Wired Device '{0}' successfully from Cisco Catalyst Center".format(device_ip) self.log(self.msg, "INFO") self.result['response'] = self.msg self.result['msg'].append(self.msg) diff --git a/plugins/modules/swim_intent.py b/plugins/modules/swim_intent.py index f1eadb5b48..23973b6182 100644 --- a/plugins/modules/swim_intent.py +++ b/plugins/modules/swim_intent.py @@ -799,37 +799,61 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ 'family': device_family, 'role': device_role } - device_list_response = self.dnac._exec( - family="devices", - function='get_device_list', - op_modifies=True, - params=device_params, - ) + offset = 0 + limit = 500 + initial_exec = False + site_memberships_ids, device_response_ids = [], [] - device_response = device_list_response.get('response') - if not response or not device_response: - self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") - return device_uuid_list + while True: + try: + if initial_exec: + device_params["limit"] = limit + device_params["offset"] = offset * limit + device_list_response = self.dnac._exec( + family="devices", + function='get_device_list', + params=device_params + ) + else: + device_list_response = self.dnac._exec( + family="devices", + function='get_device_list', + op_modifies=True, + params=device_params, + ) + initial_exec = True + offset = offset + 1 + device_response = device_list_response.get('response') + + if not response or not device_response: + self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") + break - site_memberships_ids, device_response_ids = [], [] + for item in site_response_list: + if item["reachabilityStatus"] != "Reachable": + self.log("""Device '{0}' is currently '{1}' and cannot be included in the SWIM distribution/activation + process.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") + continue + self.log("""Device '{0}' from site '{1}' is ready for the SWIM distribution/activation + process.""".format(item["managementIpAddress"], site_name), "INFO") + site_memberships_ids.append(item["instanceUuid"]) + + for item in device_response: + if item["reachabilityStatus"] != "Reachable": + self.log("""Unable to proceed with the device '{0}' for SWIM distribution/activation as its status is + '{1}'.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") + continue + self.log("""Device '{0}' matches to the specified filter requirements and is set for SWIM + distribution/activation.""".format(item["managementIpAddress"]), "INFO") + device_response_ids.append(item["instanceUuid"]) + except Exception as e: + self.msg = "An exception occured while fetching the device uuids from Cisco Catalyst Center: {0}".format(str(e)) + self.log(self.msg, "ERROR") + return device_uuid_list - for item in site_response_list: - if item["reachabilityStatus"] != "Reachable": - self.log("""Device '{0}' is currently '{1}' and cannot be included in the SWIM distribution/activation - process.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") - continue - self.log("""Device '{0}' from site '{1}' is ready for the SWIM distribution/activation - process.""".format(item["managementIpAddress"], site_name), "INFO") - site_memberships_ids.append(item["instanceUuid"]) - - for item in device_response: - if item["reachabilityStatus"] != "Reachable": - self.log("""Unable to proceed with the device '{0}' for SWIM distribution/activation as its status is - '{1}'.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") - continue - self.log("""Device '{0}' matches to the specified filter requirements and is set for SWIM - distribution/activation.""".format(item["managementIpAddress"]), "INFO") - device_response_ids.append(item["instanceUuid"]) + if not device_response_ids or not site_memberships_ids: + self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") + return device_uuid_list # Find the intersection of device IDs with the response get from get_membership api and get_device_list api with provided filters device_uuid_list = set(site_memberships_ids).intersection(set(device_response_ids)) diff --git a/plugins/modules/swim_workflow_manager.py b/plugins/modules/swim_workflow_manager.py index f7a1764fd9..45825b6a0e 100644 --- a/plugins/modules/swim_workflow_manager.py +++ b/plugins/modules/swim_workflow_manager.py @@ -785,37 +785,61 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ 'family': device_family, 'role': device_role } - device_list_response = self.dnac._exec( - family="devices", - function='get_device_list', - op_modifies=True, - params=device_params, - ) + offset = 0 + limit = 500 + initial_exec = False + site_memberships_ids, device_response_ids = [], [] - device_response = device_list_response.get('response') - if not response or not device_response: - self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") - return device_uuid_list + while True: + try: + if initial_exec: + device_params["limit"] = limit + device_params["offset"] = offset * limit + device_list_response = self.dnac._exec( + family="devices", + function='get_device_list', + params=device_params + ) + else: + device_list_response = self.dnac._exec( + family="devices", + function='get_device_list', + op_modifies=True, + params=device_params, + ) + initial_exec = True + offset = offset + 1 + device_response = device_list_response.get('response') + + if not response or not device_response: + self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") + break - site_memberships_ids, device_response_ids = [], [] + for item in site_response_list: + if item["reachabilityStatus"] != "Reachable": + self.log("""Device '{0}' is currently '{1}' and cannot be included in the SWIM distribution/activation + process.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") + continue + self.log("""Device '{0}' from site '{1}' is ready for the SWIM distribution/activation + process.""".format(item["managementIpAddress"], site_name), "INFO") + site_memberships_ids.append(item["instanceUuid"]) + + for item in device_response: + if item["reachabilityStatus"] != "Reachable": + self.log("""Unable to proceed with the device '{0}' for SWIM distribution/activation as its status is + '{1}'.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") + continue + self.log("""Device '{0}' matches to the specified filter requirements and is set for SWIM + distribution/activation.""".format(item["managementIpAddress"]), "INFO") + device_response_ids.append(item["instanceUuid"]) + except Exception as e: + self.msg = "An exception occured while fetching the device uuids from Cisco Catalyst Center: {0}".format(str(e)) + self.log(self.msg, "ERROR") + return device_uuid_list - for item in site_response_list: - if item["reachabilityStatus"] != "Reachable": - self.log("""Device '{0}' is currently '{1}' and cannot be included in the SWIM distribution/activation - process.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") - continue - self.log("""Device '{0}' from site '{1}' is ready for the SWIM distribution/activation - process.""".format(item["managementIpAddress"], site_name), "INFO") - site_memberships_ids.append(item["instanceUuid"]) - - for item in device_response: - if item["reachabilityStatus"] != "Reachable": - self.log("""Unable to proceed with the device '{0}' for SWIM distribution/activation as its status is - '{1}'.""".format(item["managementIpAddress"], item["reachabilityStatus"]), "INFO") - continue - self.log("""Device '{0}' matches to the specified filter requirements and is set for SWIM - distribution/activation.""".format(item["managementIpAddress"]), "INFO") - device_response_ids.append(item["instanceUuid"]) + if not device_response_ids or not site_memberships_ids: + self.log("Failed to retrieve devices associated with the site '{0}' due to empty API response.".format(site_name), "INFO") + return device_uuid_list # Find the intersection of device IDs with the response get from get_membership api and get_device_list api with provided filters device_uuid_list = set(site_memberships_ids).intersection(set(device_response_ids)) From 2ff83c7aca515f31c773cf120f598985f1272175 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 28 Jun 2024 15:47:45 +0530 Subject: [PATCH 053/119] Write the API in dnac.py to fetch the limit of 'get_device_list' response and make it by default to 500 --- plugins/module_utils/dnac.py | 15 +++++++++++++++ plugins/modules/inventory_intent.py | 4 ++-- plugins/modules/inventory_workflow_manager.py | 4 ++-- plugins/modules/swim_intent.py | 2 +- plugins/modules/swim_workflow_manager.py | 2 +- 5 files changed, 21 insertions(+), 6 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index d4b470dca2..2133aebbdb 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -326,6 +326,21 @@ def get_task_details(self, task_id): return result + def get_device_details_limit(self): + """ + Retrieves the limit for 'get_device_list' API to collect the device details.. + Parameters: + self (object): An instance of a class that provides access to Cisco Catalyst Center. + Returns: + int: The limit for 'get_device_list' api device details, which is set to 500 by default. + Description: + This method returns a predefined limit for the number of device details that can be processed or retrieved + from 'get_device_list' api. Currently, the limit is set to a fixed value of 500. + """ + + api_response_limit = 500 + return api_response_limit + def check_task_response_status(self, response, validation_string, api_name, data=False): """ Get the site id from the site name. diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index a12a4480df..aa141c0607 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -878,7 +878,7 @@ def device_exists_in_dnac(self): device_in_dnac = set() offset = 0 - limit = 500 + limit = self.get_device_details_limit() initial_exec = False while True: @@ -901,7 +901,7 @@ def device_exists_in_dnac(self): offset = offset + 1 response = response.get("response") if not response: - self.log("There is no device details present in Cisco Catalyst Center", "INFO") + self.log("There are no device details received from 'get_device_list' API.", "INFO") break self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 60111a530d..e70cda2b67 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -877,7 +877,7 @@ def device_exists_in_ccc(self): device_in_ccc = set() offset = 0 - limit = 500 + limit = self.get_device_details_limit() initial_exec = False while True: @@ -900,7 +900,7 @@ def device_exists_in_ccc(self): offset = offset + 1 response = response.get("response") if not response: - self.log("There is no device details present in Cisco Catalyst Center", "INFO") + self.log("There are no device details received from 'get_device_list' API.", "INFO") break self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") diff --git a/plugins/modules/swim_intent.py b/plugins/modules/swim_intent.py index 23973b6182..242eac7970 100644 --- a/plugins/modules/swim_intent.py +++ b/plugins/modules/swim_intent.py @@ -800,7 +800,7 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ 'role': device_role } offset = 0 - limit = 500 + limit = self.get_device_details_limit() initial_exec = False site_memberships_ids, device_response_ids = [], [] diff --git a/plugins/modules/swim_workflow_manager.py b/plugins/modules/swim_workflow_manager.py index 45825b6a0e..8fec10e52b 100644 --- a/plugins/modules/swim_workflow_manager.py +++ b/plugins/modules/swim_workflow_manager.py @@ -786,7 +786,7 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ 'role': device_role } offset = 0 - limit = 500 + limit = self.get_device_details_limit() initial_exec = False site_memberships_ids, device_response_ids = [], [] From 51ac4d58920339ee40208d64138e117a677c3b62 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 1 Jul 2024 11:44:28 +0530 Subject: [PATCH 054/119] Fixed the problem of not accepting the public IPs of the ISE server under network_aaa and client_and_endpoint_aaa --- .../network_settings_workflow_manager.py | 99 +++---------------- 1 file changed, 15 insertions(+), 84 deletions(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 761f99ced0..5c67c5fc2e 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -878,48 +878,6 @@ def get_obj_params(self, get_object): return obj_params - def is_server_exists(self, ip_address): - """ - Finds if the provided Authentication and Policy Server with - the ip_address is available in the system or not. - - Parameters: - ip_address (str) - IP Address of the Authentication and Policy Server. - - Returns: - True or False - True if the Authentication and Policy Server is - available in the system. Else, False. - """ - - try: - response = self.dnac._exec( - family="system_settings", - function='get_authentication_and_policy_servers' - ) - self.log("Received API response from 'get_authentication_and_policy_servers': {0}" - .format(response), "DEBUG") - if not response: - self.msg = "Failed to retrieve the Authentication and Policy Server details" - self.log(str(self.msg), "ERROR") - self.status = "failed" - return self.check_return_status() - - response = response.get("response") - server_details = get_dict_result(response, "ipAddress", ip_address) - if not server_details: - self.log("The server with IP Address '{0}' is not available in the system.".format(ip_address)) - return False - - self.log("Server details for the IP address '{0}': {1}".format(ip_address, server_details), "DEBUG") - except Exception as msg: - self.msg = "Exception occurred while retrieving server details from the IP Address '{0}': {1}" \ - .format(ip_address, msg) - self.log(str(self.msg), "CRITICAL") - self.status = "failed" - return self.check_return_status() - - return True - def get_site_id(self, site_name): """ Get the site id from the site name. @@ -1993,12 +1951,6 @@ def get_want_network(self, network_management_details): primary_server_address = network_aaa.get("primary_server_address") if primary_server_address: - if not self.is_server_exists(primary_server_address): - self.msg = "The 'primary_server_address' - '{0}' under 'network_aaa' is not found in the system." \ - .format(primary_server_address) - self.status = "failed" - return self - want_network_settings.get("network_aaa").update({ "network": primary_server_address }) @@ -2010,12 +1962,6 @@ def get_want_network(self, network_management_details): if server_type == "ISE": pan_address = network_aaa.get("pan_address") if pan_address: - if not self.is_server_exists(pan_address): - self.msg = "The 'pan_address' - '{0}' under 'network_aaa' is not found in the system." \ - .format(pan_address) - self.status = "failed" - return self - want_network_settings.get("network_aaa").update({ "ipAddress": pan_address }) @@ -2026,12 +1972,6 @@ def get_want_network(self, network_management_details): else: secondary_server_address = network_aaa.get("secondary_server_address") if secondary_server_address: - if not self.is_server_exists(secondary_server_address): - self.msg = "The 'secondary_server_address' - '{0}' under 'network_aaa' is not found in the system." \ - .format(secondary_server_address) - self.status = "failed" - return self - want_network_settings.get("network_aaa").update({ "ipAddress": secondary_server_address }) @@ -2078,12 +2018,6 @@ def get_want_network(self, network_management_details): primary_server_address = clientAndEndpoint_aaa.get("primary_server_address") if primary_server_address: - if not self.is_server_exists(primary_server_address): - self.msg = "The 'primary_server_address' - '{0}' under 'clientAndEndpoint_aaa' is not found in the system." \ - .format(primary_server_address) - self.status = "failed" - return self - want_network_settings.get("clientAndEndpoint_aaa").update({ "network": primary_server_address }) @@ -2095,12 +2029,6 @@ def get_want_network(self, network_management_details): if server_type == "ISE": pan_address = clientAndEndpoint_aaa.get("pan_address") if pan_address: - if not self.is_server_exists(pan_address): - self.msg = "The 'pan_address' - '{0}' under 'clientAndEndpoint_aaa' is not found in the system." \ - .format(pan_address) - self.status = "failed" - return self - want_network_settings.get("clientAndEndpoint_aaa").update({ "ipAddress": pan_address }) @@ -2111,12 +2039,6 @@ def get_want_network(self, network_management_details): else: secondary_server_address = clientAndEndpoint_aaa.get("secondary_server_address") if secondary_server_address: - if not self.is_server_exists(secondary_server_address): - self.msg = "The 'secondary_server_address' - '{0}' under 'clientAndEndpoint_aaa' is not found in the system." \ - .format(secondary_server_address) - self.status = "failed" - return self - want_network_settings.get("clientAndEndpoint_aaa").update({ "ipAddress": secondary_server_address }) @@ -2391,12 +2313,21 @@ def update_network(self, config): net_params = copy.deepcopy(self.want.get("wantNetwork")) net_params.update({"site_id": self.have.get("network").get("site_id")}) - response = self.dnac._exec( - family="network_settings", - function='update_network_v2', - op_modifies=True, - params=net_params, - ) + try: + response = self.dnac._exec( + family="network_settings", + function='update_network_v2', + op_modifies=True, + params=net_params, + ) + except Exception as msg: + if "[400] Bad Request" in str(msg): + self.msg = "Please provide valid server under the network_management_details." + + self.log(str(msg), "ERROR") + self.status = "failed" + return self + self.log("Received API response of 'update_network_v2': {0}".format(response), "DEBUG") validation_string = "desired common settings operation successful" self.check_task_response_status(response, validation_string, "update_network_v2").check_return_status() From cd250fe5057667e47336b1da16d6ff76ac28a150 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 2 Jul 2024 12:38:21 +0530 Subject: [PATCH 055/119] addressed review comments --- ...events_and_notifications_workflow_manager.py | 17 +++++++---------- 1 file changed, 7 insertions(+), 10 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index d7e84e16e1..22f50b7b57 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1960,19 +1960,16 @@ def webhook_header_needs_update(self, playbook_header, ccc_header): If they are not identical, it sets the update_needed flag to True. """ - update_needed = False - if len(playbook_header) == 0 and ccc_header: - update_needed = True - elif playbook_header and not ccc_header: - update_needed = True - else: - playbook_dict = {item['name']: item['value'] for item in playbook_header} - ccc_dict = {item['name']: item['value'] for item in ccc_header} + return True - return playbook_dict != ccc_dict + if playbook_header and not ccc_header: + return True - return update_needed + playbook_dict = {item['name']: item['value'] for item in playbook_header} + ccc_dict = {item['name']: item['value'] for item in ccc_header} + + return playbook_dict != ccc_dict def webhook_dest_needs_update(self, webhook_params, webhook_dest_detail_in_ccc): """ From f7bf16bcb64ee604dfd3fdb8d5966b4efe3c76a3 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 2 Jul 2024 14:34:10 +0530 Subject: [PATCH 056/119] move initial_exec in else part and rename variable --- plugins/modules/inventory_intent.py | 12 ++++++------ plugins/modules/inventory_workflow_manager.py | 12 ++++++------ plugins/modules/swim_intent.py | 2 +- plugins/modules/swim_workflow_manager.py | 2 +- 4 files changed, 14 insertions(+), 14 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index aa141c0607..3ee4844911 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -876,7 +876,7 @@ def device_exists_in_dnac(self): The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ - device_in_dnac = set() + existing_devices_in_dnac = set() offset = 0 limit = self.get_device_details_limit() initial_exec = False @@ -893,11 +893,11 @@ def device_exists_in_dnac(self): } ) else: + initial_exec = True response = self.dnac._exec( family="devices", function='get_device_list', ) - initial_exec = True offset = offset + 1 response = response.get("response") if not response: @@ -907,17 +907,17 @@ def device_exists_in_dnac(self): self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") for ip in response: device_ip = ip["managementIpAddress"] - device_in_dnac.add(device_ip) + existing_devices_in_dnac.add(device_ip) except Exception as e: self.status = "failed" self.msg = "Error while fetching device details from Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "CRITICAL") self.check_return_status() - self.log("Devices present in Cisco Catalyst Center are : {0}".format(str(device_in_dnac)), "DEBUG") - device_in_dnac = list(device_in_dnac) + self.log("Devices present in Cisco Catalyst Center: {0}".format(str(existing_devices_in_dnac)), "DEBUG") + existing_devices_in_dnac = list(existing_devices_in_dnac) - return device_in_dnac + return existing_devices_in_dnac def is_udf_exist(self, field_name): """ diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index e70cda2b67..61fcdea877 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -875,7 +875,7 @@ def device_exists_in_ccc(self): The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ - device_in_ccc = set() + existing_devices_in_ccc = set() offset = 0 limit = self.get_device_details_limit() initial_exec = False @@ -892,11 +892,11 @@ def device_exists_in_ccc(self): } ) else: + initial_exec = True response = self.dnac._exec( family="devices", function='get_device_list', ) - initial_exec = True offset = offset + 1 response = response.get("response") if not response: @@ -906,7 +906,7 @@ def device_exists_in_ccc(self): self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") for ip in response: device_ip = ip["managementIpAddress"] - device_in_ccc.add(device_ip) + existing_devices_in_ccc.add(device_ip) except Exception as e: self.status = "failed" @@ -914,10 +914,10 @@ def device_exists_in_ccc(self): self.log(self.msg, "CRITICAL") self.check_return_status() - self.log("Devices present in Cisco Catalyst Center are : {0}".format(str(device_in_ccc)), "DEBUG") - device_in_ccc = list(device_in_ccc) + self.log("Devices present in Cisco Catalyst Center: {0}".format(str(existing_devices_in_ccc)), "DEBUG") + existing_devices_in_ccc = list(existing_devices_in_ccc) - return device_in_ccc + return existing_devices_in_ccc def is_udf_exist(self, field_name): """ diff --git a/plugins/modules/swim_intent.py b/plugins/modules/swim_intent.py index 242eac7970..549efa9823 100644 --- a/plugins/modules/swim_intent.py +++ b/plugins/modules/swim_intent.py @@ -815,13 +815,13 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ params=device_params ) else: + initial_exec = True device_list_response = self.dnac._exec( family="devices", function='get_device_list', op_modifies=True, params=device_params, ) - initial_exec = True offset = offset + 1 device_response = device_list_response.get('response') diff --git a/plugins/modules/swim_workflow_manager.py b/plugins/modules/swim_workflow_manager.py index 8fec10e52b..df1e816aa3 100644 --- a/plugins/modules/swim_workflow_manager.py +++ b/plugins/modules/swim_workflow_manager.py @@ -801,13 +801,13 @@ def get_device_uuids(self, site_name, device_family, device_role, device_series_ params=device_params ) else: + initial_exec = True device_list_response = self.dnac._exec( family="devices", function='get_device_list', op_modifies=True, params=device_params, ) - initial_exec = True offset = offset + 1 device_response = device_list_response.get('response') From 30f1d316e7cbfe6c92a6f2aaaa766117d9b4c32d Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 2 Jul 2024 14:46:47 +0530 Subject: [PATCH 057/119] addressed reveiw comments --- plugins/modules/inventory_intent.py | 26 +++++++++---------- plugins/modules/inventory_workflow_manager.py | 16 ++++++------ 2 files changed, 21 insertions(+), 21 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index 3ee4844911..438682b413 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -861,22 +861,22 @@ def get_device_ips_from_config_priority(self): # If no information is available, return an empty list return [] - def device_exists_in_dnac(self): + def get_existing_devices_in_ccc(self): """ - Check which devices already exists in Cisco Catalyst Center and return both device_exist and device_not_exist in dnac. + Check which devices already exists and retrieve the list of devices that already exist in Cisco Catalyst Center. Parameters: self (object): An instance of a class used for interacting with Cisco Cisco Catalyst Center. Returns: - list: A list of devices that exist in Cisco Catalyst Center. + list: A list of management IP addresses for devices that exist in Cisco Catalyst Center. Description: Queries Cisco Catalyst Center to check which devices are already present in Cisco Catalyst Center and store its management IP address in the list of devices that exist. Example: - To use this method, create an instance of the class and call 'device_exists_in_dnac' on it, + To use this method, create an instance of the class and call 'get_existing_devices_in_ccc' on it, The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ - existing_devices_in_dnac = set() + existing_devices_in_ccc = set() offset = 0 limit = self.get_device_details_limit() initial_exec = False @@ -907,17 +907,17 @@ def device_exists_in_dnac(self): self.log("Received API response from 'get_device_list': {0}".format(str(response)), "DEBUG") for ip in response: device_ip = ip["managementIpAddress"] - existing_devices_in_dnac.add(device_ip) + existing_devices_in_ccc.add(device_ip) except Exception as e: self.status = "failed" self.msg = "Error while fetching device details from Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "CRITICAL") self.check_return_status() - self.log("Devices present in Cisco Catalyst Center: {0}".format(str(existing_devices_in_dnac)), "DEBUG") - existing_devices_in_dnac = list(existing_devices_in_dnac) + self.log("Devices present in Cisco Catalyst Center: {0}".format(str(existing_devices_in_ccc)), "DEBUG") + existing_devices_in_ccc = list(existing_devices_in_ccc) - return existing_devices_in_dnac + return existing_devices_in_ccc def is_udf_exist(self, field_name): """ @@ -1283,7 +1283,7 @@ def resync_devices(self): # Code for triggers the resync operation using the retrieved device IDs and force sync parameter. device_ips = self.get_device_ips_from_config_priority() input_device_ips = device_ips.copy() - device_in_dnac = self.device_exists_in_dnac() + device_in_dnac = self.get_existing_devices_in_ccc() for device_ip in input_device_ips: if device_ip not in device_in_dnac: @@ -2019,7 +2019,7 @@ def get_have(self, config): want_device = self.get_device_ips_from_config_priority() # Get the list of device that are present in Cisco Catalyst Center - device_in_dnac = self.device_exists_in_dnac() + device_in_dnac = self.get_existing_devices_in_ccc() device_not_in_dnac, devices_in_playbook = [], [] for ip in want_device: @@ -2927,7 +2927,7 @@ def get_diff_merged(self, config): if self.config[0].get('provision_wired_device'): provision_wired_list = self.config[0]['provision_wired_device'] device_not_available = [] - device_in_ccc = self.device_exists_in_dnac() + device_in_ccc = self.get_existing_devices_in_ccc() for prov_dict in provision_wired_list: device_ip = prov_dict['device_ip'] @@ -3697,7 +3697,7 @@ def verify_diff_deleted(self, config): self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") input_devices = self.have["want_device"] - device_in_dnac = self.device_exists_in_dnac() + device_in_dnac = self.get_existing_devices_in_ccc() if self.config[0].get('add_user_defined_field'): udf_field_list = self.config[0].get('add_user_defined_field') diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 61fcdea877..28aaca3211 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -860,18 +860,18 @@ def get_device_ips_from_config_priority(self): # If no information is available, return an empty list return [] - def device_exists_in_ccc(self): + def get_existing_devices_in_ccc(self): """ - Check which devices already exists in Cisco Catalyst Center and return both device_exist and device_not_exist in Cisco Catalyst Center. + Check which devices already exists and retrieve the list of devices that already exist in Cisco Catalyst Center. Parameters: self (object): An instance of a class used for interacting with Cisco Cisco Catalyst Center. Returns: - list: A list of devices that exist in Cisco Catalyst Center. + list: A list of management IP addresses for devices that exist in Cisco Catalyst Center. Description: Queries Cisco Catalyst Center to check which devices are already present in Cisco Catalyst Center and store its management IP address in the list of devices that exist. Example: - To use this method, create an instance of the class and call 'device_exists_in_ccc' on it, + To use this method, create an instance of the class and call 'get_existing_devices_in_ccc' on it, The method returns a list of management IP addressesfor devices that exist in Cisco Catalyst Center. """ @@ -1282,7 +1282,7 @@ def resync_devices(self): # Code for triggers the resync operation using the retrieved device IDs and force sync parameter. device_ips = self.get_device_ips_from_config_priority() input_device_ips = device_ips.copy() - device_in_ccc = self.device_exists_in_ccc() + device_in_ccc = self.get_existing_devices_in_ccc() for device_ip in input_device_ips: if device_ip not in device_in_ccc: @@ -2012,7 +2012,7 @@ def get_have(self, config): want_device = self.get_device_ips_from_config_priority() # Get the list of device that are present in Cisco Catalyst Center - device_in_ccc = self.device_exists_in_ccc() + device_in_ccc = self.get_existing_devices_in_ccc() device_not_in_ccc, devices_in_playbook = [], [] for ip in want_device: @@ -2919,7 +2919,7 @@ def get_diff_merged(self, config): if self.config[0].get('provision_wired_device'): provision_wired_list = self.config[0]['provision_wired_device'] device_not_available = [] - device_in_ccc = self.device_exists_in_ccc() + device_in_ccc = self.get_existing_devices_in_ccc() for prov_dict in provision_wired_list: device_ip = prov_dict['device_ip'] @@ -3693,7 +3693,7 @@ def verify_diff_deleted(self, config): self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") input_devices = self.have["want_device"] - device_in_ccc = self.device_exists_in_ccc() + device_in_ccc = self.get_existing_devices_in_ccc() if self.config[0].get('add_user_defined_field'): udf_field_list = self.config[0].get('add_user_defined_field') From ff568e105d32329961508319c2bb0881bf80bec5 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 2 Jul 2024 16:34:52 +0530 Subject: [PATCH 058/119] Addressed the review comments --- plugins/modules/network_settings_workflow_manager.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 5c67c5fc2e..8755e6ea97 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -2322,7 +2322,10 @@ def update_network(self, config): ) except Exception as msg: if "[400] Bad Request" in str(msg): - self.msg = "Please provide valid server under the network_management_details." + self.msg = ( + "Received Bad Request [400] from the server. " + "Please provide valid input or check the server IPs under the network_management_details." + ) self.log(str(msg), "ERROR") self.status = "failed" From cd94b9a583ceec9d2e62b35f9d9252c64c9a971d Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 2 Jul 2024 16:40:19 +0530 Subject: [PATCH 059/119] Addressed the review comments --- plugins/modules/network_settings_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 8755e6ea97..68024eb166 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -2323,7 +2323,7 @@ def update_network(self, config): except Exception as msg: if "[400] Bad Request" in str(msg): self.msg = ( - "Received Bad Request [400] from the server. " + "Received Bad Request [400] from the Catalyst Center. " "Please provide valid input or check the server IPs under the network_management_details." ) From 569d39bbe8c2c3f4188748429a623b7f00d2173e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 2 Jul 2024 19:05:25 +0530 Subject: [PATCH 060/119] Made the check for the status of the task id as a common function --- ...ise_radius_integration_workflow_manager.py | 107 +++++++++++------- 1 file changed, 63 insertions(+), 44 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 83fb2660ee..59232063bf 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -428,6 +428,7 @@ def __init__(self, module): ] self.authentication_policy_server_obj_params = \ self.get_obj_params("authenticationPolicyServer") + self.validation_string = "" def validate_input(self): """ @@ -1163,6 +1164,60 @@ def accept_cisco_ise_server_certificate(self, ipAddress, trusted_server): return None return + def check_auth_server_response_status(self, response, validation_string_set): + """ + Format the parameter of the payload for updating the authentication and policy server + in accordance with the information in the Cisco Catalyst Ceter. + + Parameters: + have_auth_server (dict) - Authentication and policy server information from the Cisco Catalyst Center. + want_auth_server (dict) - Authentication and policy server information from the Playbook. + + Returns: + self - The current object with updated desired Authentication Policy Server information. + """ + + response = response.get("response") + if response.get("errorcode") is not None: + self.msg = response.get("detail") + self.status = "failed" + return self + + task_id = response.get("taskId") + start_time = time.time() + while True: + end_time = time.time() + if (end_time - start_time) >= self.max_timeout: + self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'.".format(self.max_timeout, task_id) + \ + "Exiting the loop due to unexpected API 'edit_authentication_and_policy_server_access_configuration' status." + self.status = "failed" + break + + task_details = self.get_task_details(task_id) + self.log('Getting task details from task ID {0}: {1}'.format(task_id, task_details), "DEBUG") + if task_details.get("isError") is True: + failure_reason = task_details.get("failureReason") + if failure_reason: + self.msg = str(failure_reason) + else: + self.msg = str(task_details.get("progress")) + self.status = "failed" + break + + for validation_string in validation_string_set: + if validation_string in task_details.get("progress").lower(): + self.result['changed'] = True + self.validation_string = validation_string + self.status = "success" + + if self.result['changed'] is True: + self.log("The task with task id '{0}' is successfully executed".format(task_id), "DEBUG") + break + + self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") + + return + def format_payload_for_update(self, have_auth_server, want_auth_server): """ Format the parameter of the payload for updating the authentication and policy server @@ -1230,52 +1285,12 @@ def update_auth_policy_server(self, ipAddress): params=auth_server_params, ) validation_string_set = ("successfully created aaa settings", "operation sucessful") - response = response.get("response") - if response.get("errorcode") is not None: - self.msg = response.get("detail") - self.status = "failed" - return self - - task_id = response.get("taskId") - is_certificate_required = False - start_time = time.time() - while True: - end_time = time.time() - if (end_time - start_time) >= self.max_timeout: - self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'.".format(self.max_timeout, task_id) + \ - "Exiting the loop due to unexpected API 'add_authentication_and_policy_server_access_configuration' status." - self.status = "failed" - break - - task_details = self.get_task_details(task_id) - self.log('Getting task details from task ID {0}: {1}'.format(task_id, task_details), "DEBUG") - if task_details.get("isError") is True: - failure_reason = task_details.get("failureReason") - if failure_reason: - self.msg = str(failure_reason) - else: - self.msg = str(task_details.get("progress")) - self.status = "failed" - break - - for validation_string in validation_string_set: - if validation_string in task_details.get("progress").lower(): - self.result['changed'] = True - if validation_string == "operation sucessful": - is_certificate_required = True - self.status = "success" - - if self.result['changed'] is True: - self.log("The task with task id '{0}' is successfully executed".format(task_id), "DEBUG") - break - - self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") - + self.check_auth_server_response_status(response, validation_string_set) if self.status == "failed": self.log(self.msg, "ERROR") return - if is_ise_server and is_certificate_required: + if is_ise_server and self.validation_string == "operation sucessful": trusted_server = self.want.get("trusted_server") self.accept_cisco_ise_server_certificate(ipAddress, trusted_server) ise_integration_wait_time = self.want.get("ise_integration_wait_time") @@ -1359,8 +1374,12 @@ def update_auth_policy_server(self, ipAddress): function="edit_authentication_and_policy_server_access_configuration", params=auth_server_params, ) - validation_string = "successfully updated aaa settings" - self.check_task_response_status(response, validation_string, "edit_authentication_and_policy_server_access_configuration").check_return_status() + validation_string_set = ("successfully updated aaa settings", "operation sucessful") + self.check_auth_server_response_status(response, validation_string_set) + if self.status == "failed": + self.log(self.msg, "ERROR") + return + self.log("Authentication and Policy Server '{0}' updated successfully" .format(ipAddress), "INFO") result_auth_server.get("response").get(ipAddress) \ From e2df5308a08091a73d7135078efe7e7cf1bf5b13 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 3 Jul 2024 12:22:18 +0530 Subject: [PATCH 061/119] Addressed the review comments --- ...ise_radius_integration_workflow_manager.py | 19 ++++++++++--------- 1 file changed, 10 insertions(+), 9 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 59232063bf..dbd7da0205 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1164,14 +1164,15 @@ def accept_cisco_ise_server_certificate(self, ipAddress, trusted_server): return None return - def check_auth_server_response_status(self, response, validation_string_set): + def check_auth_server_response_status(self, response, validation_string_set, api_name): """ - Format the parameter of the payload for updating the authentication and policy server - in accordance with the information in the Cisco Catalyst Ceter. + Checks the status of a task related to updating the authentication and policy server + by polling the task details until it completes or a timeout is reached. Parameters: - have_auth_server (dict) - Authentication and policy server information from the Cisco Catalyst Center. - want_auth_server (dict) - Authentication and policy server information from the Playbook. + response (dict): The initial response from the task creation API. + validation_string_set (set): A set of strings expected to be found in the task progress for a successful operation. + api_name (str): Name of the function. Returns: self - The current object with updated desired Authentication Policy Server information. @@ -1189,7 +1190,7 @@ def check_auth_server_response_status(self, response, validation_string_set): end_time = time.time() if (end_time - start_time) >= self.max_timeout: self.msg = "Max timeout of {0} sec has reached for the execution id '{1}'.".format(self.max_timeout, task_id) + \ - "Exiting the loop due to unexpected API 'edit_authentication_and_policy_server_access_configuration' status." + "Exiting the loop due to unexpected API '{0}' status.".format(api_name) self.status = "failed" break @@ -1216,7 +1217,7 @@ def check_auth_server_response_status(self, response, validation_string_set): self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") - return + return self def format_payload_for_update(self, have_auth_server, want_auth_server): """ @@ -1285,7 +1286,7 @@ def update_auth_policy_server(self, ipAddress): params=auth_server_params, ) validation_string_set = ("successfully created aaa settings", "operation sucessful") - self.check_auth_server_response_status(response, validation_string_set) + self.check_auth_server_response_status(response, validation_string_set, "add_authentication_and_policy_server_access_configuration") if self.status == "failed": self.log(self.msg, "ERROR") return @@ -1375,7 +1376,7 @@ def update_auth_policy_server(self, ipAddress): params=auth_server_params, ) validation_string_set = ("successfully updated aaa settings", "operation sucessful") - self.check_auth_server_response_status(response, validation_string_set) + self.check_auth_server_response_status(response, validation_string_set, "edit_authentication_and_policy_server_access_configuration") if self.status == "failed": self.log(self.msg, "ERROR") return From 046ada8ec3a1fe382e6d0f27d11e90726bae1a2d Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 3 Jul 2024 12:56:25 +0530 Subject: [PATCH 062/119] Addressed the review comments --- .../ise_radius_integration_workflow_manager.py | 18 +++++++++++++----- 1 file changed, 13 insertions(+), 5 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index dbd7da0205..8dc438a5a1 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1172,7 +1172,7 @@ def check_auth_server_response_status(self, response, validation_string_set, api Parameters: response (dict): The initial response from the task creation API. validation_string_set (set): A set of strings expected to be found in the task progress for a successful operation. - api_name (str): Name of the function. + api_name (str): Name of the function during the SDK call. Returns: self - The current object with updated desired Authentication Policy Server information. @@ -1210,10 +1210,16 @@ def check_auth_server_response_status(self, response, validation_string_set, api self.result['changed'] = True self.validation_string = validation_string self.status = "success" + break if self.result['changed'] is True: self.log("The task with task id '{0}' is successfully executed".format(task_id), "DEBUG") break + else: + # sleep time after checking the status of the response from the API + sleep_time = self.max_timeout / 1000 + self.log("The time interval before checking the next response is {0}".format(sleep_time)) + time.sleep(sleep_time) self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") @@ -1280,13 +1286,14 @@ def update_auth_policy_server(self, ipAddress): auth_server_params = self.want.get("authenticationPolicyServer") self.log("Desired State for Authentication and Policy Server (want): {0}" .format(auth_server_params), "DEBUG") + function_name = "add_authentication_and_policy_server_access_configuration" response = self.dnac._exec( family="system_settings", - function="add_authentication_and_policy_server_access_configuration", + function=function_name, params=auth_server_params, ) validation_string_set = ("successfully created aaa settings", "operation sucessful") - self.check_auth_server_response_status(response, validation_string_set, "add_authentication_and_policy_server_access_configuration") + self.check_auth_server_response_status(response, validation_string_set, function_name) if self.status == "failed": self.log(self.msg, "ERROR") return @@ -1370,13 +1377,14 @@ def update_auth_policy_server(self, ipAddress): .format(auth_server_params), "DEBUG") self.log("Current State for Authentication and Policy Server (have): {0}" .format(self.have.get("authenticationPolicyServer").get("details")), "DEBUG") + function_name = "edit_authentication_and_policy_server_access_configuration" response = self.dnac._exec( family="system_settings", - function="edit_authentication_and_policy_server_access_configuration", + function=function_name, params=auth_server_params, ) validation_string_set = ("successfully updated aaa settings", "operation sucessful") - self.check_auth_server_response_status(response, validation_string_set, "edit_authentication_and_policy_server_access_configuration") + self.check_auth_server_response_status(response, validation_string_set, function_name) if self.status == "failed": self.log(self.msg, "ERROR") return From 36fe27806bc04112d725e70d39e009bf27e5850c Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 3 Jul 2024 15:57:17 +0530 Subject: [PATCH 063/119] Addressed the review comments --- .../modules/ise_radius_integration_workflow_manager.py | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 8dc438a5a1..83a17824f4 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1186,6 +1186,7 @@ def check_auth_server_response_status(self, response, validation_string_set, api task_id = response.get("taskId") start_time = time.time() + sleep_time = self.max_timeout / 1000 while True: end_time = time.time() if (end_time - start_time) >= self.max_timeout: @@ -1215,12 +1216,10 @@ def check_auth_server_response_status(self, response, validation_string_set, api if self.result['changed'] is True: self.log("The task with task id '{0}' is successfully executed".format(task_id), "DEBUG") break - else: - # sleep time after checking the status of the response from the API - sleep_time = self.max_timeout / 1000 - self.log("The time interval before checking the next response is {0}".format(sleep_time)) - time.sleep(sleep_time) + # sleep time after checking the status of the response from the API + time.sleep(sleep_time) + self.log("The time interval before checking the next response, sleep for {0}".format(sleep_time)) self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") return self From 79fc618fed150f8d83287369830c5867a259fc6b Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 3 Jul 2024 16:56:50 +0530 Subject: [PATCH 064/119] Addressed the review comments --- plugins/modules/ise_radius_integration_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 83a17824f4..e3883a2890 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1218,8 +1218,8 @@ def check_auth_server_response_status(self, response, validation_string_set, api break # sleep time after checking the status of the response from the API - time.sleep(sleep_time) self.log("The time interval before checking the next response, sleep for {0}".format(sleep_time)) + time.sleep(sleep_time) self.log("Progress set to {0} for taskid: {1}".format(task_details.get('progress'), task_id), "DEBUG") return self From fadecea56634e16fd72528cf397cd5e900b96e4b Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Wed, 3 Jul 2024 17:00:13 +0530 Subject: [PATCH 065/119] Support for importing the project using JSON file --- playbooks/device_details.template | 1 + plugins/modules/template_workflow_manager.py | 119 +++++++++++++------ 2 files changed, 81 insertions(+), 39 deletions(-) diff --git a/playbooks/device_details.template b/playbooks/device_details.template index bdf58ab610..912dc07800 100644 --- a/playbooks/device_details.template +++ b/playbooks/device_details.template @@ -14,6 +14,7 @@ template_details: template_name: 'DMVPN Spoke for Branch Router - System Default' import_project: do_version: false + project_file: 'JSON project file' payload: - name: 'Onboarding Configuration2' import_template: diff --git a/plugins/modules/template_workflow_manager.py b/plugins/modules/template_workflow_manager.py index 976cbd6e5d..67be85af61 100644 --- a/plugins/modules/template_workflow_manager.py +++ b/plugins/modules/template_workflow_manager.py @@ -191,7 +191,7 @@ type: list elements: dict required: - description: Dictates whether the parameter is mandatory for template operations. + description: Dictates whether the parameter is required for template operations. type: bool selection: description: Contains options for parameter selection when a choice is available. @@ -266,7 +266,7 @@ - VELOCITY type: str template_name: - description: Name of template. This field is mandatory to create a new template. + description: Name of template. This field is required to create a new template. type: str project_name: description: Title of the project within which the template is categorized and managed. @@ -275,7 +275,7 @@ description: Narrative that elaborates on the purpose and scope of the project. type: str software_type: - description: Applicable device software type. This field is mandatory to create a new template. + description: Applicable device software type. This field is required to create a new template. choices: - IOS - IOS-XE @@ -367,7 +367,7 @@ type: list elements: dict required: - description: Dictates whether the parameter is mandatory for template operations. + description: Dictates whether the parameter is required for template operations. type: bool selection: description: Contains options for parameter selection when a choice is available. @@ -423,10 +423,27 @@ suboptions: do_version: description: DoVersion query parameter. If this flag is true, creates a new - version of the template with the imported contents, if the templates already - exists. " If false and if template already exists, then operation - fails with 'Template already exists' error. + version of the project with the imported contents, if the projects already + exists. " If false and if project already exists, then operation + fails with 'Project already exists' error. type: bool + project_file: + description: + - Specifies the path to a JSON file that contains an import project. + - If both 'project_file' and 'payload' are provided, the 'project_file' will be given priority. + type: str + version_added: 6.17.0 + payload: + description: + - The payload parameter is used to directly import configuration data into the system. + - The payload provides an alternative way to import configurations without the need to reference an external file. + - If both 'project_file' and 'payload' are provided, the 'project_file' will be given priority. + type: list + elements: dict + suboptions: + name: + description: Name of the project to be imported. + type: str template: description: Import the templates. type: dict @@ -588,7 +605,7 @@ type: list elements: dict required: - description: Dictates whether the parameter is mandatory for template operations. + description: Dictates whether the parameter is required for template operations. type: bool selection: description: Contains options for parameter selection when a choice is available. @@ -663,7 +680,7 @@ - VELOCITY type: str template_name: - description: Name of template. This field is mandatory to create a new template. + description: Name of template. This field is required to create a new template. type: str project_name: description: Title of the project within which the template is categorized and managed. @@ -672,7 +689,7 @@ description: Narrative that elaborates on the purpose and scope of the project. type: str software_type: - description: Applicable device software type. This field is mandatory to create a new template. + description: Applicable device software type. This field is required to create a new template. choices: - IOS - IOS-XE @@ -764,7 +781,7 @@ type: list elements: dict required: - description: Dictates whether the parameter is mandatory for template operations. + description: Dictates whether the parameter is required for template operations. type: bool selection: description: Contains options for parameter selection when a choice is available. @@ -1200,7 +1217,7 @@ def get_tags(self, _tags): if name is not None: tags[i].update({"name": name}) else: - self.msg = "name is mandatory in tags in location " + str(i) + self.msg = "name is required in tags in location " + str(i) self.status = "failed" return self.check_return_status() @@ -1219,7 +1236,7 @@ def get_device_types(self, device_types): """ if device_types is None: - self.msg = "Mandatory parameter 'device_types' is required." + self.msg = "Required parameter 'device_types' is required." self.status = "failed" return self.check_return_status() @@ -1231,7 +1248,7 @@ def get_device_types(self, device_types): if product_family is not None: deviceTypes[i].update({"productFamily": product_family}) else: - self.msg = "product_family is mandatory for deviceTypes" + self.msg = "product_family is required for deviceTypes" self.status = "failed" return self.check_return_status() @@ -1331,7 +1348,7 @@ def get_template_info(self, template_params): if parameter_name is not None: templateParams[i].update({"parameterName": parameter_name}) else: - self.msg = "parameter_name is mandatory for the template_params." + self.msg = "parameter_name is required for the template_params." self.status = "failed" return self.check_return_status() @@ -1340,7 +1357,7 @@ def get_template_info(self, template_params): if data_type is not None: templateParams[i].update({"dataType": data_type}) else: - self.msg = "dataType is mandatory for the template_params." + self.msg = "dataType is required for the template_params." self.status = "failed" return self.check_return_status() if data_type not in datatypes: @@ -1368,14 +1385,14 @@ def get_template_info(self, template_params): if max_value is not None: _range[j].update({"maxValue": max_value}) else: - self.msg = "max_value is mandatory for range under template_params" + self.msg = "max_value is required for range under template_params" self.status = "failed" return self.check_return_status() min_value = value.get("min_value") if min_value is not None: _range[j].update({"minValue": min_value}) else: - self.msg = "min_value is mandatory for range under template_params" + self.msg = "min_value is required for range under template_params" self.status = "failed" return self.check_return_status() j = j + 1 @@ -1466,7 +1483,7 @@ def get_containing_templates(self, containing_templates): name = item.get("name") if name is None: - self.msg = "name is mandatory under containing templates" + self.msg = "name is required under containing templates" self.status = "failed" return self.check_return_status() @@ -1484,7 +1501,7 @@ def get_containing_templates(self, containing_templates): language = item.get("language") if language is None: - self.msg = "language is mandatory under containing templates" + self.msg = "language is required under containing templates" self.status = "failed" return self.check_return_status() @@ -1498,7 +1515,7 @@ def get_containing_templates(self, containing_templates): project_name = item.get("project_name") if project_name is None: - self.msg = "project_name is mandatory under containing templates" + self.msg = "project_name is required under containing templates" self.status = "failed" return self.check_return_status() @@ -1552,7 +1569,7 @@ def get_template_params(self, params): } language = params.get("language") if not language: - self.msg = "Mandatory parameter 'language' is required." + self.msg = "Required parameter 'language' is required." self.status = "failed" return self.check_return_status() @@ -1567,7 +1584,7 @@ def get_template_params(self, params): name = params.get("template_name") if not name: - self.msg = "Mandatory parameter 'template_name' is required." + self.msg = "Required parameter 'template_name' is required." self.status = "failed" return self.check_return_status() @@ -1575,7 +1592,7 @@ def get_template_params(self, params): projectName = params.get("project_name") if not projectName: - self.msg = "Mandatory parameter 'project_name' is required." + self.msg = "Required parameter 'project_name' is required." self.status = "failed" return self.check_return_status() @@ -1583,7 +1600,7 @@ def get_template_params(self, params): softwareType = params.get("software_type") if not softwareType: - self.msg = "Mandatory parameter 'software_type' is required." + self.msg = "Required parameter 'software_type' is required." self.status = "failed" return self.check_return_status() @@ -1755,7 +1772,7 @@ def get_have(self, config): configuration_templates = config.get("configuration_templates") if configuration_templates: if not configuration_templates.get("project_name"): - self.msg = "Mandatory Parameter project_name not available" + self.msg = "Required Parameter project_name not available" self.status = "failed" return self template_available = self.get_have_project(config) @@ -1951,7 +1968,7 @@ def requires_update(self): def update_mandatory_parameters(self, template_params): """ - Update parameters which are mandatory for creating a template. + Update parameters which are required for creating a template. Parameters: template_params (dict) - Template information. @@ -2223,18 +2240,42 @@ def handle_import(self, _import): do_version = _import_project.get("do_version") if not do_version: do_version = False - payload = None - if _import.get("project").get("payload"): - payload = _import.get("project").get("payload") - else: - self.msg = "Mandatory parameter payload is not found under import project" + + payload = _import.get("project").get("payload") + project_file = _import.get("project").get("project_file") + if not (payload or project_file): + self.msg = "Required parameter 'payload' or 'project_file' is not found under import project" self.status = "failed" return self + final_payload = [] - for item in payload: - response = self.get_project_details(item.get("name")) - if response == []: - final_payload.append(item) + if project_file: + is_path_exists = self.is_path_exists(project_file) + if not is_path_exists: + self.msg = "Import project file path '{0}' does not exist.".format(project_file) + self.status = "failed" + return self + + is_json = self.is_json(project_file) + if not is_json: + self.msg = "Import project file '{0}' is not in JSON format".format(project_file) + self.status = "failed" + return self + try: + with open(project_file, 'r') as file: + json_data = file.read() + json_project = json.loads(json_data) + final_payload = json_project + except Exception as msg: + self.msg = "An unexpected error occurred while processing the file '{0}': {1}".format(project_file, msg) + self.status = "failed" + return self + elif payload: + for item in payload: + response = self.get_project_details(item.get("name")) + if response == []: + final_payload.append(item) + if final_payload != []: _import_project = { "do_version": do_version, @@ -2251,7 +2292,7 @@ def handle_import(self, _import): ) validation_string = "successfully imported project" self.check_task_response_status(response, validation_string, "imports_the_projects_provided").check_return_status() - self.result['response'][2].get("import").get("response").update({"importProject": validation_string}) + self.result['response'][2].get("import").get("response").update({"importProject": "Successfully imported the project(s)."}) else: self.msg = "Projects '{0}' already available.".format(payload) self.result['response'][2].get("import").get("response").update({ @@ -2266,7 +2307,7 @@ def handle_import(self, _import): project_name = _import_template.get("project_name") if not _import_template.get("project_name"): - self.msg = "Mandatory parameter project_name is not found under import template" + self.msg = "Required parameter project_name is not found under import template" self.status = "failed" return self @@ -2279,7 +2320,7 @@ def handle_import(self, _import): payload = _import_template.get("payload") template_file = _import_template.get("template_file") if not (payload or template_file): - self.msg = "Mandatory parameter 'payload' or 'template_file' is not found under import template" + self.msg = "Required parameter 'payload' or 'template_file' is not found under import template" self.status = "failed" return self From 84cebac73efd7c8637467f34dbe716dfb323b5a5 Mon Sep 17 00:00:00 2001 From: Abinash Date: Thu, 4 Jul 2024 04:33:57 +0000 Subject: [PATCH 066/119] Fixing pyzipper issue --- .../device_configs_backup_workflow_manager.py | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/plugins/modules/device_configs_backup_workflow_manager.py b/plugins/modules/device_configs_backup_workflow_manager.py index dbecf4a500..94ea3f7297 100644 --- a/plugins/modules/device_configs_backup_workflow_manager.py +++ b/plugins/modules/device_configs_backup_workflow_manager.py @@ -149,7 +149,9 @@ try: import pathlib + HAS_PATHLIB = True except ImportError: + HAS_PATHLIB = False pathlib = None from ansible.module_utils.basic import AnsibleModule @@ -195,6 +197,15 @@ def validate_input(self): validated configuration. If it fails, 'self.status' will be 'failed', and 'self.msg' will describe the validation issues. """ + if HAS_PYZIPPER is False: + msg= "Pyzipper is not installed. Please install it using 'pip install pyzipper' command" + self.log(msg, "CRITICAL") + self.module.fail_json(msg=msg) + + if HAS_PATHLIB is False: + msg= "Pathlib is not installed. Please install it using 'pip install pathlib' command" + self.log(msg, "CRITICAL") + self.module.fail_json(msg=msg) if not self.config: self.msg = "config not available in playbook for validattion" @@ -287,7 +298,7 @@ def get_device_ids_list(self): params=device_params, op_modifies=True ) - self.log("Reponse collected from the API 'get_device_list' is {0}".format(str(response)), "DEBUG") + self.log("Response collected from the API 'get_device_list' is {0}".format(str(response)), "DEBUG") device_list = response.get("response") self.log("Length of the device list fetched from the API 'get_device_list' is {0}".format(str(device_list)), "INFO") From a0ca9bc9ba926e8af8de049f2fd8a4e77b909b82 Mon Sep 17 00:00:00 2001 From: Abinash Date: Thu, 4 Jul 2024 04:43:21 +0000 Subject: [PATCH 067/119] Fixing pyzipper issue --- plugins/modules/device_configs_backup_workflow_manager.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/device_configs_backup_workflow_manager.py b/plugins/modules/device_configs_backup_workflow_manager.py index 94ea3f7297..2adfbfdb9c 100644 --- a/plugins/modules/device_configs_backup_workflow_manager.py +++ b/plugins/modules/device_configs_backup_workflow_manager.py @@ -198,12 +198,12 @@ def validate_input(self): 'failed', and 'self.msg' will describe the validation issues. """ if HAS_PYZIPPER is False: - msg= "Pyzipper is not installed. Please install it using 'pip install pyzipper' command" + msg = "Pyzipper is not installed. Please install it using 'pip install pyzipper' command" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) if HAS_PATHLIB is False: - msg= "Pathlib is not installed. Please install it using 'pip install pathlib' command" + msg = "Pathlib is not installed. Please install it using 'pip install pathlib' command" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) From 3c61fd2eaf052534a4904809ed1f10dab90d3517 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Thu, 4 Jul 2024 18:04:01 +0530 Subject: [PATCH 068/119] Addressed the review comments --- plugins/modules/template_workflow_manager.py | 42 ++++++++++---------- 1 file changed, 21 insertions(+), 21 deletions(-) diff --git a/plugins/modules/template_workflow_manager.py b/plugins/modules/template_workflow_manager.py index 67be85af61..acc39a89f2 100644 --- a/plugins/modules/template_workflow_manager.py +++ b/plugins/modules/template_workflow_manager.py @@ -422,22 +422,22 @@ type: dict suboptions: do_version: - description: DoVersion query parameter. If this flag is true, creates a new - version of the project with the imported contents, if the projects already - exists. " If false and if project already exists, then operation - fails with 'Project already exists' error. + description: + - Determines whether to create a new version of the project with the imported contents. + - If set to true and the project already exists, a new version will be created. + - If false, the operation will fail with a 'Project already exists' error if the project already exists. type: bool project_file: description: - - Specifies the path to a JSON file that contains an import project. + - Specifies the path to a JSON file that contains the import project configuration. - If both 'project_file' and 'payload' are provided, the 'project_file' will be given priority. type: str version_added: 6.17.0 payload: description: - - The payload parameter is used to directly import configuration data into the system. - - The payload provides an alternative way to import configurations without the need to reference an external file. - - If both 'project_file' and 'payload' are provided, the 'project_file' will be given priority. + - Directly imports configuration data into the system using the provided payload. + - Offers an alternative to 'project_file' for importing configurations without referencing an external file. + - Ignored if 'project_file' is also provided. type: list elements: dict suboptions: @@ -1236,7 +1236,7 @@ def get_device_types(self, device_types): """ if device_types is None: - self.msg = "Required parameter 'device_types' is required." + self.msg = "The parameter 'device_types' is required but not provided." self.status = "failed" return self.check_return_status() @@ -1248,7 +1248,7 @@ def get_device_types(self, device_types): if product_family is not None: deviceTypes[i].update({"productFamily": product_family}) else: - self.msg = "product_family is required for deviceTypes" + self.msg = "The parameter 'product_family' is required for 'device_types' but not provided." self.status = "failed" return self.check_return_status() @@ -1348,7 +1348,7 @@ def get_template_info(self, template_params): if parameter_name is not None: templateParams[i].update({"parameterName": parameter_name}) else: - self.msg = "parameter_name is required for the template_params." + self.msg = "The parameter 'parameter_name' is required for 'template_params' but not provided." self.status = "failed" return self.check_return_status() @@ -1385,14 +1385,14 @@ def get_template_info(self, template_params): if max_value is not None: _range[j].update({"maxValue": max_value}) else: - self.msg = "max_value is required for range under template_params" + self.msg = "The parameter 'max_value' is required for range under 'template_params' but not provided." self.status = "failed" return self.check_return_status() min_value = value.get("min_value") if min_value is not None: _range[j].update({"minValue": min_value}) else: - self.msg = "min_value is required for range under template_params" + self.msg = "The parameter 'min_value' is required for range under 'template_params' but not provided." self.status = "failed" return self.check_return_status() j = j + 1 @@ -1483,7 +1483,7 @@ def get_containing_templates(self, containing_templates): name = item.get("name") if name is None: - self.msg = "name is required under containing templates" + self.msg = "The parameter 'name' is required under 'containing_templates' but not provided." self.status = "failed" return self.check_return_status() @@ -1501,7 +1501,7 @@ def get_containing_templates(self, containing_templates): language = item.get("language") if language is None: - self.msg = "language is required under containing templates" + self.msg = "The parameter 'language' is required under 'containing_templates' but not provided." self.status = "failed" return self.check_return_status() @@ -1515,7 +1515,7 @@ def get_containing_templates(self, containing_templates): project_name = item.get("project_name") if project_name is None: - self.msg = "project_name is required under containing templates" + self.msg = "The parameter 'project_name' is required under 'containing_templates' but not provided." self.status = "failed" return self.check_return_status() @@ -1569,7 +1569,7 @@ def get_template_params(self, params): } language = params.get("language") if not language: - self.msg = "Required parameter 'language' is required." + self.msg = "The parameter 'language' is required but not provided." self.status = "failed" return self.check_return_status() @@ -1584,7 +1584,7 @@ def get_template_params(self, params): name = params.get("template_name") if not name: - self.msg = "Required parameter 'template_name' is required." + self.msg = "The parameter 'template_name' is required but not provided." self.status = "failed" return self.check_return_status() @@ -1592,7 +1592,7 @@ def get_template_params(self, params): projectName = params.get("project_name") if not projectName: - self.msg = "Required parameter 'project_name' is required." + self.msg = "The parameter 'project_name' is required but not provided." self.status = "failed" return self.check_return_status() @@ -1600,7 +1600,7 @@ def get_template_params(self, params): softwareType = params.get("software_type") if not softwareType: - self.msg = "Required parameter 'software_type' is required." + self.msg = "The parameter 'software_type' is required but not provided." self.status = "failed" return self.check_return_status() @@ -1772,7 +1772,7 @@ def get_have(self, config): configuration_templates = config.get("configuration_templates") if configuration_templates: if not configuration_templates.get("project_name"): - self.msg = "Required Parameter project_name not available" + self.msg = "The parameter 'project_name' is required but not provided." self.status = "failed" return self template_available = self.get_have_project(config) From 9c3c82273e7849c7df05fdbb25ccf22540208834 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 9 Jul 2024 12:28:10 +0530 Subject: [PATCH 069/119] Support for the network servers and management under different sites --- .../network_settings_workflow_manager.yml | 2 +- .../network_settings_workflow_manager.py | 618 +++++++++--------- 2 files changed, 320 insertions(+), 300 deletions(-) diff --git a/playbooks/network_settings_workflow_manager.yml b/playbooks/network_settings_workflow_manager.yml index 11ddde205a..4824641eb6 100644 --- a/playbooks/network_settings_workflow_manager.yml +++ b/playbooks/network_settings_workflow_manager.yml @@ -58,7 +58,7 @@ slaac_support: True # prev_name: IP_Pool_4 network_management_details: - site_name: Global/Chennai + - site_name: Global/Chennai settings: network_aaa: #works only if we system settigns is set primary_server_address: 10.0.0.20 #Mandatory for AAA and ISE diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 68024eb166..1724a61854 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -227,7 +227,8 @@ type: bool network_management_details: description: Set default network settings for the site - type: dict + type: list + elements: dict suboptions: site_name: description: > @@ -518,7 +519,7 @@ config_verify: True config: - network_management_details: - site_name: string + - site_name: string settings: dhcp_server: list dns_server: @@ -555,7 +556,7 @@ config_verify: True config: - network_management_details: - site_name: string + - site_name: string settings: network_aaa: server_type: AAA @@ -583,7 +584,7 @@ config_verify: True config: - network_management_details: - site_name: string + - site_name: string settings: network_aaa: server_type: ISE @@ -729,7 +730,8 @@ def validate_input(self): }, }, "network_management_details": { - "type": 'dict', + "type": 'list', + "elements": 'dict', "settings": { "type": 'dict', "dhcp_server": {"type": 'list'}, @@ -1486,22 +1488,26 @@ def get_have_network(self, network_details): Returns: self - The current object with updated Network information. """ - network = {} - site_name = network_details.get("site_name") - if site_name is None: - site_name = "Global" - network_details.update({"site_name": site_name}) + all_network_management_details = [] + for item in network_details: + network = {} + site_name = item.get("site_name") + if site_name is None: + site_name = "Global" + item.update({"site_name": site_name}) - site_id = self.get_site_id(site_name) - if site_id is None: - self.msg = "The site with the name '{0}' is not available in the Catalyst Center".format(site_name) - self.status = "failed" - return self + site_id = self.get_site_id(site_name) + if site_id is None: + self.msg = "The site with the name '{0}' is not available in the Catalyst Center".format(site_name) + self.status = "failed" + return self + + network["site_id"] = site_id + network["net_details"] = self.get_network_params(site_id) + self.log("Network details from the Catalyst Center for site '{0}': {1}".format(site_name, network), "DEBUG") + all_network_management_details.append(network) - network["site_id"] = site_id - network["net_details"] = self.get_network_params(site_id) - self.log("Network details from the Catalyst Center: {0}".format(network), "DEBUG") - self.have.update({"network": network}) + self.have.update({"network": all_network_management_details}) self.msg = "Collecting the network details from the Cisco Catalyst Center" self.status = "success" return self @@ -1807,267 +1813,273 @@ def get_want_network(self, network_management_details): Returns: self - The current object with updated desired Network-related information. """ - - want_network = { - "settings": { - "dhcpServer": {}, - "dnsServer": {}, - "snmpServer": {}, - "syslogServer": {}, - "netflowcollector": {}, - "ntpServer": {}, - "timezone": "", - "messageOfTheday": {}, - "network_aaa": {}, - "clientAndEndpoint_aaa": {} + all_network_management_details = [] + network_management_index = 0 + for item in network_management_details: + item = item.get("settings") + want_network = { + "settings": { + "dhcpServer": {}, + "dnsServer": {}, + "snmpServer": {}, + "syslogServer": {}, + "netflowcollector": {}, + "ntpServer": {}, + "timezone": "", + "messageOfTheday": {}, + "network_aaa": {}, + "clientAndEndpoint_aaa": {} + } } - } - want_network_settings = want_network.get("settings") - self.log("Current state (have): {0}".format(self.have), "DEBUG") - if network_management_details.get("dhcp_server") is not None: - want_network_settings.update({ - "dhcpServer": network_management_details.get("dhcp_server") - }) - else: - del want_network_settings["dhcpServer"] - - if network_management_details.get("ntp_server") is not None: - want_network_settings.update({ - "ntpServer": network_management_details.get("ntp_server") - }) - else: - del want_network_settings["ntpServer"] - - have_timezone = self.have.get("network").get("net_details").get("settings").get("timezone") - if network_management_details.get("timezone") is not None: - want_network_settings["timezone"] = \ - network_management_details.get("timezone") - elif have_timezone is not None: - want_network_settings["timezone"] = have_timezone - else: - want_network_settings["timezone"] = "GMT" - - dnsServer = network_management_details.get("dns_server") - if dnsServer is not None: - if dnsServer.get("domain_name") is not None: - want_network_settings.get("dnsServer").update({ - "domainName": - dnsServer.get("domain_name") + want_network_settings = want_network.get("settings") + self.log("Current state (have): {0}".format(self.have), "DEBUG") + if item.get("dhcp_server") is not None: + want_network_settings.update({ + "dhcpServer": item.get("dhcp_server") }) + else: + del want_network_settings["dhcpServer"] - if dnsServer.get("primary_ip_address") is not None: - want_network_settings.get("dnsServer").update({ - "primaryIpAddress": - dnsServer.get("primary_ip_address") + if item.get("ntp_server") is not None: + want_network_settings.update({ + "ntpServer": item.get("ntp_server") }) + else: + del want_network_settings["ntpServer"] + + have_timezone = self.have.get("network")[network_management_index].get("net_details").get("settings").get("timezone") + if item.get("timezone") is not None: + want_network_settings["timezone"] = \ + item.get("timezone") + elif have_timezone is not None: + want_network_settings["timezone"] = have_timezone + else: + want_network_settings["timezone"] = "GMT" + + dnsServer = item.get("dns_server") + if dnsServer is not None: + if dnsServer.get("domain_name") is not None: + want_network_settings.get("dnsServer").update({ + "domainName": + dnsServer.get("domain_name") + }) - if dnsServer.get("secondary_ip_address") is not None: - want_network_settings.get("dnsServer").update({ - "secondaryIpAddress": - dnsServer.get("secondary_ip_address") - }) - else: - del want_network_settings["dnsServer"] + if dnsServer.get("primary_ip_address") is not None: + want_network_settings.get("dnsServer").update({ + "primaryIpAddress": + dnsServer.get("primary_ip_address") + }) - snmpServer = network_management_details.get("snmp_server") - if snmpServer is not None: - if snmpServer.get("configure_dnac_ip") is not None: - want_network_settings.get("snmpServer").update({ - "configureDnacIP": snmpServer.get("configure_dnac_ip") - }) - if snmpServer.get("ip_addresses") is not None: - want_network_settings.get("snmpServer").update({ - "ipAddresses": snmpServer.get("ip_addresses") - }) - else: - del want_network_settings["snmpServer"] + if dnsServer.get("secondary_ip_address") is not None: + want_network_settings.get("dnsServer").update({ + "secondaryIpAddress": + dnsServer.get("secondary_ip_address") + }) + else: + del want_network_settings["dnsServer"] - syslogServer = network_management_details.get("syslog_server") - if syslogServer is not None: - if syslogServer.get("configure_dnac_ip") is not None: - want_network_settings.get("syslogServer").update({ - "configureDnacIP": syslogServer.get("configure_dnac_ip") - }) - if syslogServer.get("ip_addresses") is not None: - want_network_settings.get("syslogServer").update({ - "ipAddresses": syslogServer.get("ip_addresses") - }) - else: - del want_network_settings["syslogServer"] - - netflowcollector = network_management_details.get("netflow_collector") - if netflowcollector is not None: - if netflowcollector.get("ip_address") is not None: - want_network_settings.get("netflowcollector").update({ - "ipAddress": - netflowcollector.get("ip_address") - }) - if netflowcollector.get("port") is not None: - want_network_settings.get("netflowcollector").update({ - "port": - netflowcollector.get("port") - }) - else: - del want_network_settings["netflowcollector"] - - messageOfTheday = network_management_details.get("message_of_the_day") - if messageOfTheday is not None: - if messageOfTheday.get("banner_message") is not None: - want_network_settings.get("messageOfTheday").update({ - "bannerMessage": - messageOfTheday.get("banner_message") - }) - retain_existing_banner = messageOfTheday.get("retain_existing_banner") - if retain_existing_banner is not None: - if retain_existing_banner is True: - want_network_settings.get("messageOfTheday").update({ - "retainExistingBanner": "true" + snmpServer = item.get("snmp_server") + if snmpServer is not None: + if snmpServer.get("configure_dnac_ip") is not None: + want_network_settings.get("snmpServer").update({ + "configureDnacIP": snmpServer.get("configure_dnac_ip") }) - else: - want_network_settings.get("messageOfTheday").update({ - "retainExistingBanner": "false" + if snmpServer.get("ip_addresses") is not None: + want_network_settings.get("snmpServer").update({ + "ipAddresses": snmpServer.get("ip_addresses") }) - else: - del want_network_settings["messageOfTheday"] - - server_types = ["AAA", "ISE"] - protocol_types = ["RADIUS", "TACACS"] - network_aaa = network_management_details.get("network_aaa") - if network_aaa: - server_type = network_aaa.get("server_type") - if server_type: - want_network_settings.get("network_aaa").update({ - "servers": server_type - }) else: - self.msg = "The 'server_type' is required under network_aaa." - self.status = "failed" - return self - - if server_type not in server_types: - self.msg = "The 'server_type' in the network_aaa should be in {0}".format(server_types) - self.status = "failed" - return self + del want_network_settings["snmpServer"] - primary_server_address = network_aaa.get("primary_server_address") - if primary_server_address: - want_network_settings.get("network_aaa").update({ - "network": primary_server_address - }) + syslogServer = item.get("syslog_server") + if syslogServer is not None: + if syslogServer.get("configure_dnac_ip") is not None: + want_network_settings.get("syslogServer").update({ + "configureDnacIP": syslogServer.get("configure_dnac_ip") + }) + if syslogServer.get("ip_addresses") is not None: + want_network_settings.get("syslogServer").update({ + "ipAddresses": syslogServer.get("ip_addresses") + }) else: - self.msg = "Missing required parameter 'primary_server_address' in network_aaa." - self.status = "failed" - return self + del want_network_settings["syslogServer"] + + netflowcollector = item.get("netflow_collector") + if netflowcollector is not None: + if netflowcollector.get("ip_address") is not None: + want_network_settings.get("netflowcollector").update({ + "ipAddress": + netflowcollector.get("ip_address") + }) + if netflowcollector.get("port") is not None: + want_network_settings.get("netflowcollector").update({ + "port": + netflowcollector.get("port") + }) + else: + del want_network_settings["netflowcollector"] - if server_type == "ISE": - pan_address = network_aaa.get("pan_address") - if pan_address: + messageOfTheday = item.get("message_of_the_day") + if messageOfTheday is not None: + if messageOfTheday.get("banner_message") is not None: + want_network_settings.get("messageOfTheday").update({ + "bannerMessage": + messageOfTheday.get("banner_message") + }) + retain_existing_banner = messageOfTheday.get("retain_existing_banner") + if retain_existing_banner is not None: + if retain_existing_banner is True: + want_network_settings.get("messageOfTheday").update({ + "retainExistingBanner": "true" + }) + else: + want_network_settings.get("messageOfTheday").update({ + "retainExistingBanner": "false" + }) + else: + del want_network_settings["messageOfTheday"] + + server_types = ["AAA", "ISE"] + protocol_types = ["RADIUS", "TACACS"] + network_aaa = item.get("network_aaa") + if network_aaa: + server_type = network_aaa.get("server_type") + if server_type: want_network_settings.get("network_aaa").update({ - "ipAddress": pan_address + "servers": server_type }) else: - self.msg = "Missing required parameter 'pan_address' for ISE server in network_aaa." + self.msg = "The 'server_type' is required under network_aaa." self.status = "failed" return self - else: - secondary_server_address = network_aaa.get("secondary_server_address") - if secondary_server_address: + + if server_type not in server_types: + self.msg = "The 'server_type' in the network_aaa should be in {0}".format(server_types) + self.status = "failed" + return self + + primary_server_address = network_aaa.get("primary_server_address") + if primary_server_address: want_network_settings.get("network_aaa").update({ - "ipAddress": secondary_server_address + "network": primary_server_address }) + else: + self.msg = "Missing required parameter 'primary_server_address' in network_aaa." + self.status = "failed" + return self - protocol = network_aaa.get("protocol") - if protocol: - want_network_settings.get("network_aaa").update({ - "protocol": protocol - }) - else: - want_network_settings.get("network_aaa").update({ - "protocol": "RADIUS" - }) + if server_type == "ISE": + pan_address = network_aaa.get("pan_address") + if pan_address: + want_network_settings.get("network_aaa").update({ + "ipAddress": pan_address + }) + else: + self.msg = "Missing required parameter 'pan_address' for ISE server in network_aaa." + self.status = "failed" + return self + else: + secondary_server_address = network_aaa.get("secondary_server_address") + if secondary_server_address: + want_network_settings.get("network_aaa").update({ + "ipAddress": secondary_server_address + }) + + protocol = network_aaa.get("protocol") + if protocol: + want_network_settings.get("network_aaa").update({ + "protocol": protocol + }) + else: + want_network_settings.get("network_aaa").update({ + "protocol": "RADIUS" + }) - if protocol not in protocol_types: - self.msg = "The 'protocol' in the network_aaa should be in {0}".format(protocol_types) - self.status = "failed" - return self + if protocol not in protocol_types: + self.msg = "The 'protocol' in the network_aaa should be in {0}".format(protocol_types) + self.status = "failed" + return self - shared_secret = network_aaa.get("shared_secret") - if shared_secret: - want_network_settings.get("network_aaa").update({ - "sharedSecret": shared_secret - }) - else: - del want_network_settings["network_aaa"] - - clientAndEndpoint_aaa = network_management_details.get("client_and_endpoint_aaa") - if clientAndEndpoint_aaa: - server_type = clientAndEndpoint_aaa.get("server_type") - if server_type: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "servers": server_type - }) + shared_secret = network_aaa.get("shared_secret") + if shared_secret: + want_network_settings.get("network_aaa").update({ + "sharedSecret": shared_secret + }) else: - self.msg = "The 'server_type' is required under client_and_endpoint_aaa." - self.status = "failed" - return self + del want_network_settings["network_aaa"] - if server_type not in server_types: - self.msg = "The 'server_type' in the client_and_endpoint_aaa should be in {0}".format(server_types) - self.status = "failed" - return self + clientAndEndpoint_aaa = item.get("client_and_endpoint_aaa") + if clientAndEndpoint_aaa: + server_type = clientAndEndpoint_aaa.get("server_type") + if server_type: + want_network_settings.get("clientAndEndpoint_aaa").update({ + "servers": server_type + }) + else: + self.msg = "The 'server_type' is required under client_and_endpoint_aaa." + self.status = "failed" + return self - primary_server_address = clientAndEndpoint_aaa.get("primary_server_address") - if primary_server_address: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "network": primary_server_address - }) - else: - self.msg = "Missing required parameter 'primary_server_address' in client_and_endpoint_aaa." - self.status = "failed" - return self + if server_type not in server_types: + self.msg = "The 'server_type' in the client_and_endpoint_aaa should be in {0}".format(server_types) + self.status = "failed" + return self - if server_type == "ISE": - pan_address = clientAndEndpoint_aaa.get("pan_address") - if pan_address: + primary_server_address = clientAndEndpoint_aaa.get("primary_server_address") + if primary_server_address: want_network_settings.get("clientAndEndpoint_aaa").update({ - "ipAddress": pan_address + "network": primary_server_address }) else: - self.msg = "Missing required parameter 'pan_address' for ISE server in client_and_endpoint_aaa." + self.msg = "Missing required parameter 'primary_server_address' in client_and_endpoint_aaa." self.status = "failed" return self - else: - secondary_server_address = clientAndEndpoint_aaa.get("secondary_server_address") - if secondary_server_address: + + if server_type == "ISE": + pan_address = clientAndEndpoint_aaa.get("pan_address") + if pan_address: + want_network_settings.get("clientAndEndpoint_aaa").update({ + "ipAddress": pan_address + }) + else: + self.msg = "Missing required parameter 'pan_address' for ISE server in client_and_endpoint_aaa." + self.status = "failed" + return self + else: + secondary_server_address = clientAndEndpoint_aaa.get("secondary_server_address") + if secondary_server_address: + want_network_settings.get("clientAndEndpoint_aaa").update({ + "ipAddress": secondary_server_address + }) + + protocol = clientAndEndpoint_aaa.get("protocol") + if protocol: want_network_settings.get("clientAndEndpoint_aaa").update({ - "ipAddress": secondary_server_address + "protocol": protocol + }) + else: + want_network_settings.get("clientAndEndpoint_aaa").update({ + "protocol": "RADIUS" }) - protocol = clientAndEndpoint_aaa.get("protocol") - if protocol: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "protocol": protocol - }) - else: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "protocol": "RADIUS" - }) + if protocol not in protocol_types: + self.msg = "The 'protocol' in the client_and_endpoint_aaa should be in {0}".format(protocol_types) + self.status = "failed" + return self - if protocol not in protocol_types: - self.msg = "The 'protocol' in the client_and_endpoint_aaa should be in {0}".format(protocol_types) - self.status = "failed" - return self + shared_secret = clientAndEndpoint_aaa.get("shared_secret") + if shared_secret: + want_network_settings.get("clientAndEndpoint_aaa").update({ + "sharedSecret": shared_secret + }) + else: + del want_network_settings["clientAndEndpoint_aaa"] - shared_secret = clientAndEndpoint_aaa.get("shared_secret") - if shared_secret: - want_network_settings.get("clientAndEndpoint_aaa").update({ - "sharedSecret": shared_secret - }) - else: - del want_network_settings["clientAndEndpoint_aaa"] + all_network_management_details.append(want_network) + network_management_index += 1 - self.log("Network playbook details: {0}".format(want_network), "DEBUG") - self.want.update({"wantNetwork": want_network}) + self.log("Network playbook details: {0}".format(all_network_management_details), "DEBUG") + self.want.update({"wantNetwork": all_network_management_details}) self.msg = "Collected the network details from the playbook" self.status = "success" return self @@ -2092,8 +2104,7 @@ def get_want(self, config): self.get_want_reserve_pool(reserve_pool).check_return_status() if config.get("network_management_details"): - network_management_details = config.get("network_management_details") \ - .get("settings") + network_management_details = config.get("network_management_details") self.get_want_network(network_management_details).check_return_status() self.log("Desired State (want): {0}".format(self.want), "INFO") @@ -2278,67 +2289,70 @@ def update_reserve_pool(self, reserve_pool): self.log("Updated reserved IP subpool successfully", "INFO") return - def update_network(self, config): + def update_network(self, network_management): """ Update or create a network configuration in Cisco Catalyst Center based on the provided playbook details. Parameters: - config (list of dict) - Playbook details containing Network Management information. + network_management (list of dict) - Playbook details containing Network Management information. Returns: None """ + network_management_index = 0 + for item in network_management: + site_name = item.get("site_name") + result_network = self.result.get("response")[2].get("network") + result_network.get("response").update({site_name: {}}) - site_name = config.get("network_management_details").get("site_name") - result_network = self.result.get("response")[2].get("network") - result_network.get("response").update({site_name: {}}) - - # Check update is required or not - if not self.requires_update(self.have.get("network").get("net_details"), - self.want.get("wantNetwork"), self.network_obj_params): + # Check update is required or not + if not self.requires_update(self.have.get("network")[network_management_index].get("net_details"), + self.want.get("wantNetwork")[network_management_index], self.network_obj_params): - self.log("Network in site '{0}' doesn't require an update.".format(site_name), "INFO") - result_network.get("response").get(site_name).update({ - "Cisco Catalyst Center params": self.have.get("network") - .get("net_details").get("settings") - }) - result_network.get("msg").update({site_name: "Network doesn't require an update"}) - return + self.log("Network in site '{0}' doesn't require an update.".format(site_name), "INFO") + result_network.get("response").get(site_name).update({ + "Cisco Catalyst Center params": self.have.get("network")[network_management_index] + .get("net_details").get("settings") + }) + result_network.get("msg").update({site_name: "Network doesn't require an update"}) + continue - self.log("Network in site '{0}' requires update.".format(site_name), "INFO") - self.log("Current State of network in Catalyst Center: {0}" - .format(self.have.get("network")), "DEBUG") - self.log("Desired State of network: {0}".format(self.want.get("wantNetwork")), "DEBUG") + self.log("Network in site '{0}' requires update.".format(site_name), "INFO") + self.log("Current State of network in Catalyst Center: {0}" + .format(self.have.get("network")), "DEBUG") + self.log("Desired State of network: {0}".format(self.want.get("wantNetwork")), "DEBUG") - net_params = copy.deepcopy(self.want.get("wantNetwork")) - net_params.update({"site_id": self.have.get("network").get("site_id")}) - try: - response = self.dnac._exec( - family="network_settings", - function='update_network_v2', - op_modifies=True, - params=net_params, - ) - except Exception as msg: - if "[400] Bad Request" in str(msg): - self.msg = ( - "Received Bad Request [400] from the Catalyst Center. " - "Please provide valid input or check the server IPs under the network_management_details." + net_params = copy.deepcopy(self.want.get("wantNetwork")[network_management_index]) + net_params.update({"site_id": self.have.get("network")[network_management_index].get("site_id")}) + try: + response = self.dnac._exec( + family="network_settings", + function='update_network_v2', + op_modifies=True, + params=net_params, ) + except Exception as msg: + if "[400] Bad Request" in str(msg): + self.msg = ( + "Received Bad Request [400] from the Catalyst Center. " + "Please provide valid input or check the server IPs under the network_management_details." + ) + + self.log(str(msg), "ERROR") + self.status = "failed" + return self - self.log(str(msg), "ERROR") - self.status = "failed" - return self + self.log("Received API response of 'update_network_v2': {0}".format(response), "DEBUG") + validation_string = "desired common settings operation successful" + self.check_task_response_status(response, validation_string, "update_network_v2").check_return_status() + self.log("Network under the site '{0}' has been changed successfully".format(site_name), "INFO") + result_network.get("msg") \ + .update({site_name: "Network Updated successfully"}) + result_network.get("response").get(site_name) \ + .update({"Network Details": self.want.get("wantNetwork")[network_management_index].get("settings")}) + network_management_index += 1 - self.log("Received API response of 'update_network_v2': {0}".format(response), "DEBUG") - validation_string = "desired common settings operation successful" - self.check_task_response_status(response, validation_string, "update_network_v2").check_return_status() - self.log("Network has been changed successfully", "INFO") - result_network.get("msg") \ - .update({site_name: "Network Updated successfully"}) - result_network.get("response").get(site_name) \ - .update({"Network Details": self.want.get("wantNetwork").get("settings")}) return def get_diff_merged(self, config): @@ -2362,8 +2376,9 @@ def get_diff_merged(self, config): if reserve_pool is not None: self.update_reserve_pool(reserve_pool) - if config.get("network_management_details") is not None: - self.update_network(config) + network_management = config.get("network_management_details") + if network_management is not None: + self.update_network(network_management) return self @@ -2540,15 +2555,20 @@ def verify_diff_merged(self, config): self.log("Successfully validated the reserved pool(s)", "INFO") self.result.get("response")[1].get("reservePool").update({"Validation": "Success"}) - if config.get("network_management_details") is not None: - if self.requires_update(self.have.get("network").get("net_details"), - self.want.get("wantNetwork"), self.network_obj_params): - self.msg = "Network Functions Config is not applied to the Cisco Catalyst Center" - self.status = "failed" - return self + network_management_details = config.get("network_management_details") + if network_management_details is not None: + network_management_index = 0 + for item in network_management_details: + if self.requires_update(self.have.get("network")[network_management_index].get("net_details"), + self.want.get("wantNetwork")[network_management_index], self.network_obj_params): + self.msg = "Network Functions Config is not applied to the Cisco Catalyst Center" + self.status = "failed" + return self + + self.log("Successfully validated the network functions '{0}'." + .format(item.get("site_name")), "INFO") + network_management_index += 1 - self.log("Successfully validated the network functions '{0}'." - .format(config.get("network_management_details").get("site_name")), "INFO") self.result.get("response")[2].get("network").update({"Validation": "Success"}) self.msg = "Successfully validated the Global Pool, Reserve Pool and the Network Functions." From 15141807fb07e21af60e61ead8c6f956372f46b7 Mon Sep 17 00:00:00 2001 From: Phan Nguyen Date: Thu, 11 Jul 2024 21:54:07 -0700 Subject: [PATCH 070/119] Checking rate limit and re-trying requests --- plugins/module_utils/dnac.py | 30 +++++++++++++++++++++++++++++- 1 file changed, 29 insertions(+), 1 deletion(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 0ff8a85472..eba36cbdfa 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -1048,10 +1048,14 @@ def validate_list_of_dicts(param_list, spec, module=None): return normalized, invalid_params +RATE_LIMIT_MESSAGE = "Rate Limit exceeded" +RATE_LIMIT_RETRY_AFTER = 15 + class DNACSDK(object): def __init__(self, params): self.result = dict(changed=False, result="") self.validate_response_schema = params.get("validate_response_schema") + self.logger = logging.getLogger('dnacentersdk') if DNAC_SDK_IS_INSTALLED: self.api = api.DNACenterAPI( username=params.get("dnac_username"), @@ -1064,7 +1068,7 @@ def __init__(self, params): debug=params.get("dnac_debug"), ) if params.get("dnac_debug") and LOGGING_IN_STANDARD: - logging.getLogger('dnacentersdk').addHandler(logging.StreamHandler()) + self.logger.addHandler(logging.StreamHandler()) else: self.fail_json(msg="DNA Center Python SDK is not installed. Execute 'pip install dnacentersdk'") @@ -1105,6 +1109,8 @@ def extract_file_name(self, file_path): return os.path.basename(file_path) def _exec(self, family, function, params=None, op_modifies=False, **kwargs): + family_name = family + function_name = function try: family = getattr(self.api, family) func = getattr(family, function) @@ -1130,8 +1136,30 @@ def _exec(self, family, function, params=None, op_modifies=False, **kwargs): params["active_validation"] = False response = func(**params) + else: response = func() + + if response and isinstance(response, dict) and response.get("executionId"): + execution_id = response.get("executionId") + exec_details_params = {"execution_id": execution_id} + exec_details_func = getattr( + getattr(self.api, "task"), "get_business_api_execution_details" + ) + + while True: + execution_details = exec_details_func(**exec_details_params) + if execution_details.get("status") == "SUCCESS": + break + + bapi_error = execution_details.get("bapiError") + if bapi_error and RATE_LIMIT_MESSAGE in bapi_error: + self.logger.warning("!!!!! %s !!!!!", RATE_LIMIT_MESSAGE) + time.sleep(RATE_LIMIT_RETRY_AFTER) + return self._exec( + family_name, function_name, params, op_modifies, **kwargs + ) + except exceptions.dnacentersdkException as e: self.fail_json( msg=( From 64eb03cb3662bc7101d2e0812f8816c5d7c536e5 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Fri, 12 Jul 2024 14:52:48 +0530 Subject: [PATCH 071/119] Addressed the review commetsn --- .../network_settings_workflow_manager.py | 100 +++++++++--------- 1 file changed, 50 insertions(+), 50 deletions(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 1724a61854..c1c9ec5c0c 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -771,7 +771,6 @@ def validate_input(self): "secondary_server_address": {"type": 'string'}, "protocol": {"type": 'string', "choices": ["RADIUS", "TACACS"]}, "shared_secret": {"type": 'string'} - }, "client_and_endpoint_aaa": { "type": 'dict', @@ -1067,12 +1066,13 @@ def get_network_params(self, site_id): network_aaa = get_dict_result(all_network_details, "key", "aaa.network.server.1") network_aaa2 = get_dict_result(all_network_details, "key", "aaa.network.server.2") network_aaa_pan = get_dict_result(all_network_details, "key", "aaa.server.pan.network") - clientAndEndpoint_aaa = get_dict_result(all_network_details, "key", "aaa.endpoint.server.1") - clientAndEndpoint_aaa2 = get_dict_result(all_network_details, - "key", - "aaa.endpoint.server.2") - clientAndEndpoint_aaa_pan = \ - get_dict_result(all_network_details, "key", "aaa.server.pan.endpoint") + client_and_endpoint_aaa = get_dict_result(all_network_details, "key", "aaa.endpoint.server.1") + client_and_endpoint_aaa2 = get_dict_result(all_network_details, + "key", + "aaa.endpoint.server.2") + client_and_endpoint_aaa_pan = get_dict_result(all_network_details, + "key", + "aaa.server.pan.endpoint") # Prepare the network details for Cisco Catalyst Center configuration network_details = { @@ -1160,15 +1160,15 @@ def get_network_params(self, site_id): } }) - if clientAndEndpoint_aaa and clientAndEndpoint_aaa_pan: - aaa_pan_value = clientAndEndpoint_aaa_pan.get("value")[0] - aaa_value = clientAndEndpoint_aaa.get("value")[0] + if client_and_endpoint_aaa and client_and_endpoint_aaa_pan: + aaa_pan_value = client_and_endpoint_aaa_pan.get("value")[0] + aaa_value = client_and_endpoint_aaa.get("value")[0] if aaa_pan_value == "None": network_settings.update({ "clientAndEndpoint_aaa": { "network": aaa_value.get("ipAddress"), "protocol": aaa_value.get("protocol"), - "ipAddress": clientAndEndpoint_aaa2.get("value")[0].get("ipAddress"), + "ipAddress": client_and_endpoint_aaa2.get("value")[0].get("ipAddress"), "servers": "AAA" } }) @@ -1856,77 +1856,77 @@ def get_want_network(self, network_management_details): else: want_network_settings["timezone"] = "GMT" - dnsServer = item.get("dns_server") - if dnsServer is not None: - if dnsServer.get("domain_name") is not None: + dns_server = item.get("dns_server") + if dns_server is not None: + if dns_server.get("domain_name") is not None: want_network_settings.get("dnsServer").update({ "domainName": - dnsServer.get("domain_name") + dns_server.get("domain_name") }) - if dnsServer.get("primary_ip_address") is not None: + if dns_server.get("primary_ip_address") is not None: want_network_settings.get("dnsServer").update({ "primaryIpAddress": - dnsServer.get("primary_ip_address") + dns_server.get("primary_ip_address") }) - if dnsServer.get("secondary_ip_address") is not None: + if dns_server.get("secondary_ip_address") is not None: want_network_settings.get("dnsServer").update({ "secondaryIpAddress": - dnsServer.get("secondary_ip_address") + dns_server.get("secondary_ip_address") }) else: del want_network_settings["dnsServer"] - snmpServer = item.get("snmp_server") - if snmpServer is not None: - if snmpServer.get("configure_dnac_ip") is not None: + snmp_server = item.get("snmp_server") + if snmp_server is not None: + if snmp_server.get("configure_dnac_ip") is not None: want_network_settings.get("snmpServer").update({ - "configureDnacIP": snmpServer.get("configure_dnac_ip") + "configureDnacIP": snmp_server.get("configure_dnac_ip") }) - if snmpServer.get("ip_addresses") is not None: + if snmp_server.get("ip_addresses") is not None: want_network_settings.get("snmpServer").update({ - "ipAddresses": snmpServer.get("ip_addresses") + "ipAddresses": snmp_server.get("ip_addresses") }) else: del want_network_settings["snmpServer"] - syslogServer = item.get("syslog_server") - if syslogServer is not None: - if syslogServer.get("configure_dnac_ip") is not None: + syslog_server = item.get("syslog_server") + if syslog_server is not None: + if syslog_server.get("configure_dnac_ip") is not None: want_network_settings.get("syslogServer").update({ - "configureDnacIP": syslogServer.get("configure_dnac_ip") + "configureDnacIP": syslog_server.get("configure_dnac_ip") }) - if syslogServer.get("ip_addresses") is not None: + if syslog_server.get("ip_addresses") is not None: want_network_settings.get("syslogServer").update({ - "ipAddresses": syslogServer.get("ip_addresses") + "ipAddresses": syslog_server.get("ip_addresses") }) else: del want_network_settings["syslogServer"] - netflowcollector = item.get("netflow_collector") - if netflowcollector is not None: - if netflowcollector.get("ip_address") is not None: + netflow_collector = item.get("netflow_collector") + if netflow_collector is not None: + if netflow_collector.get("ip_address") is not None: want_network_settings.get("netflowcollector").update({ "ipAddress": - netflowcollector.get("ip_address") + netflow_collector.get("ip_address") }) - if netflowcollector.get("port") is not None: + if netflow_collector.get("port") is not None: want_network_settings.get("netflowcollector").update({ "port": - netflowcollector.get("port") + netflow_collector.get("port") }) else: del want_network_settings["netflowcollector"] - messageOfTheday = item.get("message_of_the_day") - if messageOfTheday is not None: - if messageOfTheday.get("banner_message") is not None: + message_of_the_day = item.get("message_of_the_day") + if message_of_the_day is not None: + if message_of_the_day.get("banner_message") is not None: want_network_settings.get("messageOfTheday").update({ "bannerMessage": - messageOfTheday.get("banner_message") + message_of_the_day.get("banner_message") }) - retain_existing_banner = messageOfTheday.get("retain_existing_banner") + retain_existing_banner = message_of_the_day.get("retain_existing_banner") if retain_existing_banner is not None: if retain_existing_banner is True: want_network_settings.get("messageOfTheday").update({ @@ -2008,9 +2008,9 @@ def get_want_network(self, network_management_details): else: del want_network_settings["network_aaa"] - clientAndEndpoint_aaa = item.get("client_and_endpoint_aaa") - if clientAndEndpoint_aaa: - server_type = clientAndEndpoint_aaa.get("server_type") + client_and_endpoint_aaa = item.get("client_and_endpoint_aaa") + if client_and_endpoint_aaa: + server_type = client_and_endpoint_aaa.get("server_type") if server_type: want_network_settings.get("clientAndEndpoint_aaa").update({ "servers": server_type @@ -2025,7 +2025,7 @@ def get_want_network(self, network_management_details): self.status = "failed" return self - primary_server_address = clientAndEndpoint_aaa.get("primary_server_address") + primary_server_address = client_and_endpoint_aaa.get("primary_server_address") if primary_server_address: want_network_settings.get("clientAndEndpoint_aaa").update({ "network": primary_server_address @@ -2036,7 +2036,7 @@ def get_want_network(self, network_management_details): return self if server_type == "ISE": - pan_address = clientAndEndpoint_aaa.get("pan_address") + pan_address = client_and_endpoint_aaa.get("pan_address") if pan_address: want_network_settings.get("clientAndEndpoint_aaa").update({ "ipAddress": pan_address @@ -2046,13 +2046,13 @@ def get_want_network(self, network_management_details): self.status = "failed" return self else: - secondary_server_address = clientAndEndpoint_aaa.get("secondary_server_address") + secondary_server_address = client_and_endpoint_aaa.get("secondary_server_address") if secondary_server_address: want_network_settings.get("clientAndEndpoint_aaa").update({ "ipAddress": secondary_server_address }) - protocol = clientAndEndpoint_aaa.get("protocol") + protocol = client_and_endpoint_aaa.get("protocol") if protocol: want_network_settings.get("clientAndEndpoint_aaa").update({ "protocol": protocol @@ -2067,7 +2067,7 @@ def get_want_network(self, network_management_details): self.status = "failed" return self - shared_secret = clientAndEndpoint_aaa.get("shared_secret") + shared_secret = client_and_endpoint_aaa.get("shared_secret") if shared_secret: want_network_settings.get("clientAndEndpoint_aaa").update({ "sharedSecret": shared_secret From 6871f630199cf4499f2294f8b7b3fb0225ac02ac Mon Sep 17 00:00:00 2001 From: Phan Nguyen Date: Fri, 12 Jul 2024 08:11:13 -0700 Subject: [PATCH 072/119] Added a bank line for PEP8 E302 --- plugins/module_utils/dnac.py | 1 + 1 file changed, 1 insertion(+) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index eba36cbdfa..158f7da2ee 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -1051,6 +1051,7 @@ def validate_list_of_dicts(param_list, spec, module=None): RATE_LIMIT_MESSAGE = "Rate Limit exceeded" RATE_LIMIT_RETRY_AFTER = 15 + class DNACSDK(object): def __init__(self, params): self.result = dict(changed=False, result="") From d12b38eefcffc30d19cd7ff33d08bf4e49b70cca Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 15 Jul 2024 10:58:12 +0530 Subject: [PATCH 073/119] Support for multiple authentication and policy servers --- ...se_radius_integration_workflow_manager.yml | 8 +- ...ise_radius_integration_workflow_manager.py | 994 +++++++++--------- 2 files changed, 521 insertions(+), 481 deletions(-) diff --git a/playbooks/ise_radius_integration_workflow_manager.yml b/playbooks/ise_radius_integration_workflow_manager.yml index 9ca9a9181a..a3fa1291b1 100644 --- a/playbooks/ise_radius_integration_workflow_manager.yml +++ b/playbooks/ise_radius_integration_workflow_manager.yml @@ -20,7 +20,7 @@ config_verify: True config: - authentication_policy_server: - server_type: AAA # [ISE, AAA] + - server_type: AAA # [ISE, AAA] server_ip_address: 10.0.0.20 shared_secret: cisco protocol: RADIUS_TACACS # [TACACS, RADIUS, RADIUS_TACACS] @@ -49,7 +49,7 @@ config_verify: True config: - authentication_policy_server: - server_ip_address: 10.0.0.20 + - server_ip_address: 10.0.0.20 - name: Create ISE Server. cisco.dnac.ise_radius_integration_workflow_manager: @@ -67,7 +67,7 @@ config_verify: True config: - authentication_policy_server: - server_type: ISE # [ISE, AAA] + - server_type: ISE # [ISE, AAA] server_ip_address: 10.195.243.59 shared_secret: cisco protocol: RADIUS_TACACS # [TACACS, RADIUS, RADIUS_TACACS] @@ -106,4 +106,4 @@ config_verify: True config: - authentication_policy_server: - server_ip_address: 10.195.243.59 + - server_ip_address: 10.195.243.59 diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index e3883a2890..579deb6ee5 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -42,7 +42,8 @@ suboptions: authentication_policy_server: description: Manages the Authentication and Policy Servers. - type: dict + type: list + elements: dict suboptions: server_type: description: @@ -243,7 +244,7 @@ config_verify: True config: - authentication_policy_server: - server_type: AAA + - server_type: AAA server_ip_address: 10.0.0.1 shared_secret: "12345" protocol: RADIUS_TACACS @@ -271,7 +272,7 @@ config_verify: True config: - authentication_policy_server: - server_type: ISE + - server_type: ISE server_ip_address: 10.0.0.2 shared_secret: "12345" protocol: RADIUS_TACACS @@ -309,7 +310,7 @@ config_verify: True config: - authentication_policy_server: - server_type: AAA + - server_type: AAA server_ip_address: 10.0.0.1 protocol: RADIUS_TACACS retries: 3 @@ -330,7 +331,7 @@ config_verify: True config: - authentication_policy_server: - server_type: ISE + - server_type: ISE server_ip_address: 10.0.0.2 protocol: RADIUS_TACACS retries: 3 @@ -359,7 +360,7 @@ config_verify: True config: - authentication_policy_server: - server_ip_address: 10.0.0.1 + - server_ip_address: 10.0.0.1 """ RETURN = r""" @@ -452,7 +453,8 @@ def validate_input(self): # temp_spec is the specification for the expected structure of configuration parameters temp_spec = { "authentication_policy_server": { - "type": "dict", + "type": "list", + "elements": "dict", "server_type": {"type": 'string', "choices": ["AAA", "ISE"]}, "server_ip_address": {"type": 'string'}, "shared_secret": {"type": 'string'}, @@ -661,14 +663,14 @@ def auth_server_exists(self, ipAddress): self.log("Formatted Authenticaion and Policy Server details: {0}".format(AuthServer), "DEBUG") return AuthServer - def get_have_authentication_policy_server(self, config): + def get_have_authentication_policy_server(self, authentication_policy_server): """ Get the current Authentication and Policy Server information from Cisco Catalyst Center based on the provided playbook details. check this API using check_return_status. Parameters: - config (dict) - Playbook details containing + authentication_policy_server (list of dict) - Playbook details containing Authentication and Policy Server configuration. Returns: @@ -676,31 +678,29 @@ def get_have_authentication_policy_server(self, config): Authentication and Policy Server information. """ - AuthServer = { - "exists": False, - "details": None, - "id": None - } - authentication_policy_server = config.get("authentication_policy_server") - if authentication_policy_server is None: - self.msg = "authentication_policy_server in config is missing in the playbook" - self.status = "failed" - return self + all_auth_server_details = [] + for item in authentication_policy_server: + AuthServer = { + "exists": False, + "details": None, + "id": None + } + ip_address = item.get("server_ip_address") + if ip_address is None: + self.msg = "Missing parameter 'server_ip_address' is required." + self.status = "failed" + return self - ip_address = authentication_policy_server.get("server_ip_address") - if ip_address is None: - self.msg = "Missing parameter 'server_ip_address' is required." - self.status = "failed" - return self + AuthServer = self.auth_server_exists(ip_address) + self.log("Authentication and Policy Server exists for '{0}': {1}" + .format(ip_address, AuthServer.get("exists")), "DEBUG") + self.log("Authentication and Policy Server details for '{0}': {1}" + .format(ip_address, AuthServer.get("details")), "DEBUG") + self.log("Authentication and Policy Server Id for '{0}': {1}" + .format(ip_address, AuthServer.get("id")), "DEBUG") + all_auth_server_details.append(AuthServer) - AuthServer = self.auth_server_exists(ip_address) - self.log("Authentication and Policy Server exists: {0}" - .format(AuthServer.get("exists")), "DEBUG") - self.log("Authentication and Policy Server details: {0}" - .format(AuthServer.get("details")), "DEBUG") - self.log("Authentication and Policy Server Id: {0}" - .format(AuthServer.get("id")), "DEBUG") - self.have.update({"authenticationPolicyServer": AuthServer}) + self.have.update({"authenticationPolicyServer": all_auth_server_details}) self.msg = "Collecting the Authentication and Policy Server " + \ "details from the Cisco Catalyst Center." self.status = "success" @@ -719,8 +719,13 @@ def get_have(self, config): Authentication and Policy Server information. """ - if config.get("authentication_policy_server") is not None: - self.get_have_authentication_policy_server(config).check_return_status() + authentication_policy_server = config.get("authentication_policy_server") + if authentication_policy_server is not None: + self.get_have_authentication_policy_server(authentication_policy_server).check_return_status() + else: + self.msg = "authentication_policy_server in config is missing in the playbook" + self.status = "failed" + return self self.log("Current State (have): {0}".format(self.have), "INFO") self.msg = "Successfully retrieved the details from the Cisco Catalyst Center" @@ -734,7 +739,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): Check the return value of the API with check_return_status() Parameters: - auth_policy_server (dict) - Playbook authentication policy server details + auth_policy_server (list of dict) - Playbook authentication policy server details containing IpAddress, authentication port, accounting port, Cisco ISE Details, protocol, retries, role, timeout seconds, encryption details. @@ -742,358 +747,364 @@ def get_want_authentication_policy_server(self, auth_policy_server): self - The current object with updated desired Authentication Policy Server information. """ - auth_server = {} - auth_server_exists = self.have.get("authenticationPolicyServer").get("exists") - auth_server_details = self.have.get("authenticationPolicyServer").get("details") - trusted_server = False - if not auth_server_exists: - server_type = auth_policy_server.get("server_type") - if server_type not in ["ISE", "AAA", None]: - self.msg = "The server_type should either be ISE or AAA but not {0}.".format(server_type) - self.status = "failed" - return self + all_auth_server_details = [] + auth_server_index = 0 + for item in auth_policy_server: + auth_server = {} + auth_server_exists = self.have.get("authenticationPolicyServer")[auth_server_index].get("exists") + auth_server_details = self.have.get("authenticationPolicyServer")[auth_server_index].get("details") + trusted_server = False + if not auth_server_exists: + server_type = item.get("server_type") + if server_type not in ["ISE", "AAA", None]: + self.msg = "The server_type should either be ISE or AAA but not {0}.".format(server_type) + self.status = "failed" + return self - if server_type == "ISE": - auth_server.update({"isIseEnabled": True}) + if server_type == "ISE": + auth_server.update({"isIseEnabled": True}) + else: + auth_server.update({"isIseEnabled": False}) else: - auth_server.update({"isIseEnabled": False}) - else: - auth_server.update({"isIseEnabled": auth_server_details.get("isIseEnabled")}) - - auth_server.update({"ipAddress": auth_policy_server.get("server_ip_address")}) + auth_server.update({"isIseEnabled": auth_server_details.get("isIseEnabled")}) - auth_server_exists = self.have.get("authenticationPolicyServer").get("exists") - - if not auth_server_exists: - shared_secret = auth_policy_server.get("shared_secret") - if not shared_secret: - self.msg = "Missing parameter 'shared_secret' is required." - self.status = "failed" - return self + auth_server.update({"ipAddress": item.get("server_ip_address")}) - shared_secret = str(shared_secret) - if len(shared_secret) < 4 or len(shared_secret) > 100: - self.msg = "The 'shared_secret' should contain between 4 and 100 characters." - self.status = "failed" - return self + auth_server_exists = self.have.get("authenticationPolicyServer")[auth_server_index].get("exists") - invalid_chars = " ?<" - for char in invalid_chars: - if char in shared_secret: - self.msg = "The 'shared_secret' should not contain spaces or the characters '?', '<'." + if not auth_server_exists: + shared_secret = item.get("shared_secret") + if not shared_secret: + self.msg = "Missing parameter 'shared_secret' is required." self.status = "failed" return self - auth_server.update({"sharedSecret": shared_secret}) - - protocol = auth_policy_server.get("protocol") - if protocol not in ["RADIUS", "TACACS", "RADIUS_TACACS", None]: - self.msg = "protocol should either be ['RADIUS', 'TACACS', 'RADIUS_TACACS']." + \ - "It should not be {0}".format(protocol) - self.status = "failed" - return self + shared_secret = str(shared_secret) + if len(shared_secret) < 4 or len(shared_secret) > 100: + self.msg = "The 'shared_secret' should contain between 4 and 100 characters." + self.status = "failed" + return self - if protocol is not None: - auth_server.update({"protocol": protocol}) - else: - if not auth_server_exists: - auth_server.update({"protocol": "RADIUS"}) - else: - auth_server.update({"protocol": auth_server_details.get("protocol")}) + invalid_chars = " ?<" + for char in invalid_chars: + if char in shared_secret: + self.msg = "The 'shared_secret' should not contain spaces or the characters '?', '<'." + self.status = "failed" + return self - auth_server.update({"port": 49}) + auth_server.update({"sharedSecret": shared_secret}) - if not auth_server_exists: - encryption_scheme = auth_policy_server.get("encryption_scheme") - if encryption_scheme not in ["KEYWRAP", "RADSEC", None]: - self.msg = "The encryption_scheme should be in ['KEYWRAP', 'RADSEC']. " + \ - "It should not be {0}.".format(encryption_scheme) + protocol = item.get("protocol") + if protocol not in ["RADIUS", "TACACS", "RADIUS_TACACS", None]: + self.msg = "protocol should either be ['RADIUS', 'TACACS', 'RADIUS_TACACS']." + \ + "It should not be {0}".format(protocol) self.status = "failed" return self - if encryption_scheme: - auth_server.update({"encryptionScheme": encryption_scheme}) - - if encryption_scheme == "KEYWRAP": - message_key = auth_policy_server.get("message_authenticator_code_key") - if not message_key: - self.msg = "The 'message_authenticator_code_key' should not be empty if the encryption_scheme is 'KEYWRAP'." - self.status = "failed" - return self - - message_key = str(message_key) - message_key_length = len(message_key) - if message_key_length != 20: - self.msg = "The 'message_authenticator_code_key' should be exactly 20 characters." - self.status = "failed" - return self - - auth_server.update({"messageKey": message_key}) + if protocol is not None: + auth_server.update({"protocol": protocol}) + else: + if not auth_server_exists: + auth_server.update({"protocol": "RADIUS"}) + else: + auth_server.update({"protocol": auth_server_details.get("protocol")}) - encryption_key = auth_policy_server.get("encryption_key") - if not encryption_key: - self.msg = "The encryption_key should not be empty if encryption_scheme is 'KEYWRAP'." - self.status = "failed" - return self + auth_server.update({"port": 49}) - encryption_key = str(encryption_key) - encryption_key_length = len(encryption_key) - if encryption_key_length != 16: - self.msg = "The 'encryption_key' must be 16 characters long. It may contain alphanumeric and special characters." + if not auth_server_exists: + encryption_scheme = item.get("encryption_scheme") + if encryption_scheme not in ["KEYWRAP", "RADSEC", None]: + self.msg = "The encryption_scheme should be in ['KEYWRAP', 'RADSEC']. " + \ + "It should not be {0}.".format(encryption_scheme) self.status = "failed" return self - auth_server.update({"encryptionKey": encryption_key}) + if encryption_scheme: + auth_server.update({"encryptionScheme": encryption_scheme}) - if not auth_server_exists: - authentication_port = auth_policy_server.get("authentication_port") - if not authentication_port: - authentication_port = 1812 + if encryption_scheme == "KEYWRAP": + message_key = item.get("message_authenticator_code_key") + if not message_key: + self.msg = "The 'message_authenticator_code_key' should not be empty if the encryption_scheme is 'KEYWRAP'." + self.status = "failed" + return self - if not str(authentication_port).isdigit(): - self.msg = "The 'authentication_port' should contain only digits." - self.status = "failed" - return self + message_key = str(message_key) + message_key_length = len(message_key) + if message_key_length != 20: + self.msg = "The 'message_authenticator_code_key' should be exactly 20 characters." + self.status = "failed" + return self - if authentication_port < 1 or authentication_port > 65535: - self.msg = "The 'authentication_port' should be from 1 to 65535." - self.status = "failed" - return self + auth_server.update({"messageKey": message_key}) - auth_server.update({"authenticationPort": authentication_port}) - else: - auth_server.update({"authenticationPort": auth_server_details.get("authenticationPort")}) + encryption_key = item.get("encryption_key") + if not encryption_key: + self.msg = "The encryption_key should not be empty if encryption_scheme is 'KEYWRAP'." + self.status = "failed" + return self - if not auth_server_exists: - accounting_port = auth_policy_server.get("accounting_port") - if not accounting_port: - accounting_port = 1813 + encryption_key = str(encryption_key) + encryption_key_length = len(encryption_key) + if encryption_key_length != 16: + self.msg = "The 'encryption_key' must be 16 characters long. It may contain alphanumeric and special characters." + self.status = "failed" + return self - if not str(accounting_port).isdigit(): - self.msg = "The 'accounting_port' should contain only digits." - self.status = "failed" - return self + auth_server.update({"encryptionKey": encryption_key}) - if accounting_port < 1 or accounting_port > 65535: - self.msg = "The 'accounting_port' should be from 1 to 65535." - self.status = "failed" - return self + if not auth_server_exists: + authentication_port = item.get("authentication_port") + if not authentication_port: + authentication_port = 1812 - auth_server.update({"accountingPort": accounting_port}) - else: - auth_server.update({"accountingPort": auth_server_details.get("accountingPort")}) + if not str(authentication_port).isdigit(): + self.msg = "The 'authentication_port' should contain only digits." + self.status = "failed" + return self - retries = auth_policy_server.get("retries") - if not retries: - if not auth_server_exists: - auth_server.update({"retries": "3"}) - else: - auth_server.update({"retries": auth_server_details.get("retries")}) - else: - try: - retries_int = int(retries) - if retries_int < 1 or retries_int > 3: - self.msg = "The 'retries' should be from 1 to 3." + if authentication_port < 1 or authentication_port > 65535: + self.msg = "The 'authentication_port' should be from 1 to 65535." self.status = "failed" return self - except ValueError: - self.msg = "The 'retries' should contain only from 0-9." - self.status = "failed" - return self - auth_server.update({"retries": str(retries)}) + auth_server.update({"authenticationPort": authentication_port}) + else: + auth_server.update({"authenticationPort": auth_server_details.get("authenticationPort")}) - timeout = auth_policy_server.get("timeout") - if not auth_server_exists: - default_timeout = "4" - else: - default_timeout = str(auth_server_details.get("timeoutSeconds")) + if not auth_server_exists: + accounting_port = item.get("accounting_port") + if not accounting_port: + accounting_port = 1813 - # If 'timeout' is not provided, use 'default_timeout' - if timeout is None: - auth_server.update({"timeoutSeconds": default_timeout}) - else: - try: - timeout_int = int(timeout) - if timeout_int < 2 or timeout_int > 20: - self.msg = "The 'timeout' should be from 2 to 20." + if not str(accounting_port).isdigit(): + self.msg = "The 'accounting_port' should contain only digits." self.status = "failed" return self - auth_server.update({"timeoutSeconds": str(timeout)}) - except ValueError: - self.msg = "The 'time_out' must contain only digits." - self.status = "failed" - return self - - # Determine the role based on whether the auth server exists and if the role is specified - if not auth_server_exists: - # Use the role from 'auth_policy_server' if available, otherwise default to "secondary" - role = auth_policy_server.get("role", "secondary") - else: - # Use the role from 'auth_server_details' - role = auth_server_details.get("role") - - auth_server.update({"role": role}) + if accounting_port < 1 or accounting_port > 65535: + self.msg = "The 'accounting_port' should be from 1 to 65535." + self.status = "failed" + return self - if auth_server.get("isIseEnabled"): - cisco_ise_dtos = auth_policy_server.get("cisco_ise_dtos") - if not cisco_ise_dtos: - self.msg = "Missing parameter 'cisco_ise_dtos' " + \ - "required when server_type is 'ISE'." - self.status = "failed" - return self + auth_server.update({"accountingPort": accounting_port}) + else: + auth_server.update({"accountingPort": auth_server_details.get("accountingPort")}) - auth_server.update({"ciscoIseDtos": []}) - position_ise_creds = 0 - for ise_credential in cisco_ise_dtos: - auth_server.get("ciscoIseDtos").append({}) - user_name = ise_credential.get("user_name") - if not user_name: - if not auth_server_exists: - self.msg = "Missing parameter 'user_name' is required when server_type is ISE." + retries = item.get("retries") + if not retries: + if not auth_server_exists: + auth_server.update({"retries": "3"}) + else: + auth_server.update({"retries": auth_server_details.get("retries")}) + else: + try: + retries_int = int(retries) + if retries_int < 1 or retries_int > 3: + self.msg = "The 'retries' should be from 1 to 3." self.status = "failed" return self - - user_name = auth_server_details.get("ciscoIseDtos")[0].get("userName") - - auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "userName": user_name - }) - - password = ise_credential.get("password") - if not password: - self.msg = "Missing parameter 'password' is required when server_type is ISE." + except ValueError: + self.msg = "The 'retries' should contain only from 0-9." self.status = "failed" return self - if not 4 <= len(password) <= 127: - self.msg = "" - self.status = "failed" - return self + auth_server.update({"retries": str(retries)}) - auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "password": password - }) + timeout = item.get("timeout") + if not auth_server_exists: + default_timeout = "4" + else: + default_timeout = str(auth_server_details.get("timeoutSeconds")) - fqdn = ise_credential.get("fqdn") - if not fqdn: - if not auth_server_exists: - self.msg = "Missing parameter 'fqdn' is required when server_type is ISE." + # If 'timeout' is not provided, use 'default_timeout' + if timeout is None: + auth_server.update({"timeoutSeconds": default_timeout}) + else: + try: + timeout_int = int(timeout) + if timeout_int < 2 or timeout_int > 20: + self.msg = "The 'timeout' should be from 2 to 20." self.status = "failed" return self - fqdn = auth_server_details.get("ciscoIseDtos")[0].get("fqdn") + auth_server.update({"timeoutSeconds": str(timeout)}) + except ValueError: + self.msg = "The 'time_out' must contain only digits." + self.status = "failed" + return self - auth_server.get("ciscoIseDtos")[position_ise_creds].update({"fqdn": fqdn}) + # Determine the role based on whether the auth server exists and if the role is specified + if not auth_server_exists: + # Use the role from 'auth_policy_server' if available, otherwise default to "secondary" + role = item.get("role", "secondary") + else: + # Use the role from 'auth_server_details' + role = auth_server_details.get("role") - ip_address = ise_credential.get("ip_address") - if not ip_address: - self.msg = "Missing parameter 'ip_address' is required when server_type is ISE." + auth_server.update({"role": role}) + + if auth_server.get("isIseEnabled"): + cisco_ise_dtos = item.get("cisco_ise_dtos") + if not cisco_ise_dtos: + self.msg = "Missing parameter 'cisco_ise_dtos' " + \ + "required when server_type is 'ISE'." self.status = "failed" return self - auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "ipAddress": ip_address - }) + auth_server.update({"ciscoIseDtos": []}) + position_ise_creds = 0 + for ise_credential in cisco_ise_dtos: + auth_server.get("ciscoIseDtos").append({}) + user_name = ise_credential.get("user_name") + if not user_name: + if not auth_server_exists: + self.msg = "Missing parameter 'user_name' is required when server_type is ISE." + self.status = "failed" + return self + + user_name = auth_server_details.get("ciscoIseDtos")[0].get("userName") - if not auth_server_exists: - auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "subscriberName": "ersadmin" - }) - else: auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "subscriberName": auth_server_details.get("ciscoIseDtos")[0].get("subscriberName") + "userName": user_name }) - description = ise_credential.get("description") - if description: + password = ise_credential.get("password") + if not password: + self.msg = "Missing parameter 'password' is required when server_type is ISE." + self.status = "failed" + return self + + if not 4 <= len(password) <= 127: + self.msg = "" + self.status = "failed" + return self + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "description": description + "password": password }) - ssh_key = ise_credential.get("ssh_key") - if ssh_key: + fqdn = ise_credential.get("fqdn") + if not fqdn: + if not auth_server_exists: + self.msg = "Missing parameter 'fqdn' is required when server_type is ISE." + self.status = "failed" + return self + + fqdn = auth_server_details.get("ciscoIseDtos")[0].get("fqdn") + + auth_server.get("ciscoIseDtos")[position_ise_creds].update({"fqdn": fqdn}) + + ip_address = ise_credential.get("ip_address") + if not ip_address: + self.msg = "Missing parameter 'ip_address' is required when server_type is ISE." + self.status = "failed" + return self + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ - "sshkey": str(ssh_key) + "ipAddress": ip_address }) - position_ise_creds += 1 + if not auth_server_exists: + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ + "subscriberName": "ersadmin" + }) + else: + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ + "subscriberName": auth_server_details.get("ciscoIseDtos")[0].get("subscriberName") + }) - pxgrid_enabled = auth_policy_server.get("pxgrid_enabled") - if pxgrid_enabled is None: - if auth_server_exists: - pxgrid_enabled = auth_server_details.get("pxgridEnabled") - else: - pxgrid_enabled = True + description = ise_credential.get("description") + if description: + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ + "description": description + }) - auth_server.update({"pxgridEnabled": pxgrid_enabled}) + ssh_key = ise_credential.get("ssh_key") + if ssh_key: + auth_server.get("ciscoIseDtos")[position_ise_creds].update({ + "sshkey": str(ssh_key) + }) - use_dnac_cert_for_pxgrid = auth_policy_server.get("use_dnac_cert_for_pxgrid") - if use_dnac_cert_for_pxgrid is None: - if auth_server_exists: - use_dnac_cert_for_pxgrid = auth_server_details.get("useDnacCertForPxgrid") - else: - use_dnac_cert_for_pxgrid = False - - auth_server.update({"useDnacCertForPxgrid": use_dnac_cert_for_pxgrid}) - - external_cisco_ise_ip_addr_dtos = auth_policy_server \ - .get("external_cisco_ise_ip_addr_dtos") - if external_cisco_ise_ip_addr_dtos: - auth_server.update({"externalCiscoIseIpAddrDtos": []}) - position_ise_addresses = 0 - for external_cisco_ise in external_cisco_ise_ip_addr_dtos: - external_cisco_ise_ip_addresses = external_cisco_ise \ - .get("external_cisco_ise_ip_addresses") - if external_cisco_ise_ip_addresses: - auth_server.get("externalCiscoIseIpAddrDtos").append({}) - auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ - .update({"externalCiscoIseIpAddresses": []}) - position_ise_address = 0 - for external_ip_address in external_cisco_ise_ip_addresses: + position_ise_creds += 1 + + pxgrid_enabled = item.get("pxgrid_enabled") + if pxgrid_enabled is None: + if auth_server_exists: + pxgrid_enabled = auth_server_details.get("pxgridEnabled") + else: + pxgrid_enabled = True + + auth_server.update({"pxgridEnabled": pxgrid_enabled}) + + use_dnac_cert_for_pxgrid = item.get("use_dnac_cert_for_pxgrid") + if use_dnac_cert_for_pxgrid is None: + if auth_server_exists: + use_dnac_cert_for_pxgrid = auth_server_details.get("useDnacCertForPxgrid") + else: + use_dnac_cert_for_pxgrid = False + + auth_server.update({"useDnacCertForPxgrid": use_dnac_cert_for_pxgrid}) + + external_cisco_ise_ip_addr_dtos = item \ + .get("external_cisco_ise_ip_addr_dtos") + if external_cisco_ise_ip_addr_dtos: + auth_server.update({"externalCiscoIseIpAddrDtos": []}) + position_ise_addresses = 0 + for external_cisco_ise in external_cisco_ise_ip_addr_dtos: + external_cisco_ise_ip_addresses = external_cisco_ise \ + .get("external_cisco_ise_ip_addresses") + if external_cisco_ise_ip_addresses: + auth_server.get("externalCiscoIseIpAddrDtos").append({}) auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ - .get("externalCiscoIseIpAddresses").append({}) + .update({"externalCiscoIseIpAddresses": []}) + position_ise_address = 0 + for external_ip_address in external_cisco_ise_ip_addresses: + auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ + .get("externalCiscoIseIpAddresses").append({}) + auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ + .get("externalCiscoIseIpAddresses")[position_ise_address].update({ + "externalIpAddress": external_ip_address.get("external_ip_address") + }) + position_ise_address += 1 + ise_type = external_cisco_ise.get("ise_type") + if ise_type: auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ - .get("externalCiscoIseIpAddresses")[position_ise_address].update({ - "externalIpAddress": external_ip_address.get("external_ip_address") - }) - position_ise_address += 1 - ise_type = external_cisco_ise.get("ise_type") - if ise_type: - auth_server.get("externalCiscoIseIpAddrDtos")[position_ise_addresses] \ - .update({"type": ise_type}) - position_ise_addresses += 1 - - trusted_server = auth_policy_server.get("trusted_server") - if auth_policy_server.get("trusted_server") is None: - trusted_server = True - else: - trusted_server = auth_policy_server.get("trusted_server") + .update({"type": ise_type}) + position_ise_addresses += 1 - self.want.update({"trusted_server": trusted_server}) + trusted_server = item.get("trusted_server") + if item.get("trusted_server") is None: + trusted_server = True + else: + trusted_server = item.get("trusted_server") - ise_integration_wait_time = auth_policy_server.get("ise_integration_wait_time") - if ise_integration_wait_time is None: - ise_integration_wait_time = 20 - else: - try: - ise_integration_wait_time_int = int(ise_integration_wait_time) - if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 120: - self.msg = "The ise_integration_wait_time should be from 1 to 120 seconds." + self.want.update({"trusted_server": trusted_server}) + + ise_integration_wait_time = item.get("ise_integration_wait_time") + if ise_integration_wait_time is None: + ise_integration_wait_time = 20 + else: + try: + ise_integration_wait_time_int = int(ise_integration_wait_time) + if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 120: + self.msg = "The ise_integration_wait_time should be from 1 to 120 seconds." + self.status = "failed" + return self + + except ValueError: + self.msg = "The 'ise_integration_wait_time' should contain only digits." self.status = "failed" return self - except ValueError: - self.msg = "The 'ise_integration_wait_time' should contain only digits." - self.status = "failed" - return self + self.want.update({"ise_integration_wait_time": ise_integration_wait_time}) - self.want.update({"ise_integration_wait_time": ise_integration_wait_time}) + self.log("Authentication and Policy Server playbook details: {0}" + .format(auth_server), "DEBUG") + all_auth_server_details.append(auth_server) + auth_server_index += 1 - self.log("Authentication and Policy Server playbook details: {0}" - .format(auth_server), "DEBUG") - self.want.update({"authenticationPolicyServer": auth_server}) + self.want.update({"authenticationPolicyServer": all_auth_server_details}) self.msg = "Collecting the Authentication and Policy Server details from the playbook" self.status = "success" return self @@ -1264,137 +1275,151 @@ def format_payload_for_update(self, have_auth_server, want_auth_server): self.status = "success" return self - def update_auth_policy_server(self, ipAddress): + def update_auth_policy_server(self, authentication_policy_server): """ Update/Create Authentication and Policy Server in Cisco Catalyst Center with fields provided in playbook. Parameters: - ipAddress (str) - The Ip address of the Authentication and Policy Server to be deleted. + authentication_policy_server (List of Dict) - Playbook details of the Authentication and Policy Server. Returns: None """ result_auth_server = self.result.get("response")[0].get("authenticationPolicyServer") - result_auth_server.get("response").update({ipAddress: {}}) + auth_server_index = -1 + for item in authentication_policy_server: + auth_server_index += 1 + ip_address = item.get("server_ip_address") + result_auth_server.get("response").update({ip_address: {}}) + + # Check Authentication and Policy Server exist, if not create and return + is_ise_server = self.want.get("authenticationPolicyServer")[auth_server_index].get("isIseEnabled") + if not self.have.get("authenticationPolicyServer")[auth_server_index].get("exists"): + auth_server_params = self.want.get("authenticationPolicyServer")[auth_server_index] + self.log("Desired State for Authentication and Policy Server for the IP '{0}' (want): {1}" + .format(ip_address, auth_server_params), "DEBUG") + function_name = "add_authentication_and_policy_server_access_configuration" + response = self.dnac._exec( + family="system_settings", + function=function_name, + params=auth_server_params, + ) + validation_string_set = ("successfully created aaa settings", "operation sucessful") + self.check_auth_server_response_status(response, validation_string_set, function_name) + if self.status == "failed": + self.log(self.msg, "ERROR") + return + + if is_ise_server: + trusted_server = self.want.get("trusted_server") + self.accept_cisco_ise_server_certificate(ip_address, trusted_server) + ise_integration_wait_time = self.want.get("ise_integration_wait_time") + time.sleep(ise_integration_wait_time) + response = self.dnac._exec( + family="system_settings", + function='get_authentication_and_policy_servers', + params={"is_ise_enabled": True} + ) + response = response.get("response") + if response is None: + self.msg = "Failed to retrieve the information from the API 'get_authentication_and_policy_servers' of {0}." \ + .format(ip_address) + self.status = "failed" + return + + ise_server_details = get_dict_result(response, "ipAddress", ip_address) + ise_state_set = {"FAILED", "INPROGRESS"} + state = ise_server_details.get("state") + if state in ise_state_set: + if state == "INPROGRESS": + self.msg = "The Cisco ISE server '{ip}' integration is incomplete, currently in 'INPROGRESS' state. ".format(ip=ip_address) + \ + "The integration has exceeded the expected duration of '{wait_time}' second(s)." \ + .format(wait_time=ise_integration_wait_time) + elif state == "FAILED": + self.msg = "The Cisco ISE server '{ip}' integration has failed and in 'FAILED' state." \ + .format(ip=ip_address) + if self.want.get("trusted_server") is False: + self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ + "this certificate from Cisco ISE, and it is not yet trusted." + + self.log(str(self.msg), "ERROR") + self.status = "failed" + return + + self.log("Successfully created Authentication and Policy Server '{0}'." + .format(ip_address), "INFO") + result_auth_server.get("response").get(ip_address) \ + .update({ + "authenticationPolicyServer Details": self.want + .get("authenticationPolicyServer")[auth_server_index] + }) + result_auth_server.get("msg").update({ + ip_address: "Authentication and Policy Server Created Successfully" + }) + continue + + # Authentication and Policy Server exists, check update is required + # Edit API not working, remove this + self.format_payload_for_update(self.have.get("authenticationPolicyServer")[auth_server_index].get("details"), + self.want.get("authenticationPolicyServer")[auth_server_index]).check_return_status() + is_ise_server_enabled = self.have.get("authenticationPolicyServer")[auth_server_index].get("details").get("isIseEnabled") + if not (is_ise_server_enabled or self.requires_update(self.have.get("authenticationPolicyServer")[auth_server_index].get("details"), + self.want.get("authenticationPolicyServer")[auth_server_index], + self.authentication_policy_server_obj_params)): + self.log("Authentication and Policy Server '{0}' doesn't require an update" + .format(ip_address), "INFO") + result_auth_server.get("response").get(ip_address).update({ + "Cisco Catalyst Center params": + self.have.get("authenticationPolicyServer")[auth_server_index].get("details") + }) + result_auth_server.get("response").get(ip_address).update({ + "Id": self.have.get("authenticationPolicyServer")[auth_server_index].get("id") + }) + result_auth_server.get("msg").update({ + ip_address: "Authentication and Policy Server doesn't require an update" + }) + continue - # Check Authentication and Policy Server exist, if not create and return - is_ise_server = self.want.get("authenticationPolicyServer").get("isIseEnabled") - if not self.have.get("authenticationPolicyServer").get("exists"): - auth_server_params = self.want.get("authenticationPolicyServer") + self.log("Authentication and Policy Server requires update", "DEBUG") + + # Authenticaiton and Policy Server Exists + auth_server_params = copy.deepcopy(self.want.get("authenticationPolicyServer")[auth_server_index]) + auth_server_params.update({"id": self.have.get("authenticationPolicyServer")[auth_server_index].get("id")}) self.log("Desired State for Authentication and Policy Server (want): {0}" .format(auth_server_params), "DEBUG") - function_name = "add_authentication_and_policy_server_access_configuration" + self.log("Current State for Authentication and Policy Server (have): {0}" + .format(self.have.get("authenticationPolicyServer")[auth_server_index].get("details")), "DEBUG") + function_name = "edit_authentication_and_policy_server_access_configuration" response = self.dnac._exec( family="system_settings", function=function_name, params=auth_server_params, ) - validation_string_set = ("successfully created aaa settings", "operation sucessful") + validation_string_set = ("successfully updated aaa settings", "operation sucessful") self.check_auth_server_response_status(response, validation_string_set, function_name) if self.status == "failed": self.log(self.msg, "ERROR") return - if is_ise_server and self.validation_string == "operation sucessful": - trusted_server = self.want.get("trusted_server") - self.accept_cisco_ise_server_certificate(ipAddress, trusted_server) + trusted_server = self.want.get("trusted_server") + trusted_server_msg = "" + if trusted_server is True: + self.accept_cisco_ise_server_certificate(ip_address, trusted_server) ise_integration_wait_time = self.want.get("ise_integration_wait_time") time.sleep(ise_integration_wait_time) - response = self.dnac._exec( - family="system_settings", - function='get_authentication_and_policy_servers', - params={"is_ise_enabled": True} - ) - response = response.get("response") - if response is None: - self.msg = "Failed to retrieve the information from the API 'get_authentication_and_policy_servers' of {0}." \ - .format(ipAddress) - self.status = "failed" - return - - ise_server_details = get_dict_result(response, "ipAddress", ipAddress) - ise_state_set = {"FAILED", "INPROGRESS"} - state = ise_server_details.get("state") - if state in ise_state_set: - if state == "INPROGRESS": - self.msg = "The Cisco ISE server '{ip}' integration is incomplete, currently in 'INPROGRESS' state. ".format(ip=ipAddress) + \ - "The integration has exceeded the expected duration of '{wait_time}' second(s)." \ - .format(wait_time=ise_integration_wait_time) - elif state == "FAILED": - self.msg = "The Cisco ISE server '{ip}' integration has failed and in 'FAILED' state." \ - .format(ip=ipAddress) - if self.want.get("trusted_server") is False: - self.msg += " This is the first time Cisco Catalyst Center has encountered " + \ - "this certificate from Cisco ISE, and it is not yet trusted." - - self.log(str(self.msg), "ERROR") - self.status = "failed" - return + else: + trusted_server_msg = " But the server is not trusted." - self.log("Successfully created Authentication and Policy Server '{0}'." - .format(ipAddress), "INFO") - result_auth_server.get("response").get(ipAddress) \ - .update({ - "authenticationPolicyServer Details": self.want - .get("authenticationPolicyServer") - }) - result_auth_server.get("msg").update({ - ipAddress: "Authentication and Policy Server Created Successfully" - }) - return - - # Authentication and Policy Server exists, check update is required - # Edit API not working, remove this - self.format_payload_for_update(self.have.get("authenticationPolicyServer").get("details"), - self.want.get("authenticationPolicyServer")).check_return_status() - is_ise_server_enabled = self.have.get("authenticationPolicyServer").get("details").get("isIseEnabled") - if not (is_ise_server_enabled or self.requires_update(self.have.get("authenticationPolicyServer").get("details"), - self.want.get("authenticationPolicyServer"), - self.authentication_policy_server_obj_params)): - self.log("Authentication and Policy Server '{0}' doesn't require an update" - .format(ipAddress), "INFO") - result_auth_server.get("response").get(ipAddress).update({ - "Cisco Catalyst Center params": - self.have.get("authenticationPolicyServer").get("details") - }) - result_auth_server.get("response").get(ipAddress).update({ - "Id": self.have.get("authenticationPolicyServer").get("id") - }) + self.log("Authentication and Policy Server '{0}' updated successfully" + .format(ip_address), "INFO") + result_auth_server.get("response").get(ip_address) \ + .update({"Id": self.have.get("authenticationPolicyServer")[auth_server_index].get("id")}) result_auth_server.get("msg").update({ - ipAddress: "Authentication and Policy Server doesn't require an update" + ip_address: "Authentication and Policy Server Updated Successfully.{0}".format(trusted_server_msg) }) - return - - self.log("Authentication and Policy Server requires update", "DEBUG") - - # Authenticaiton and Policy Server Exists - auth_server_params = copy.deepcopy(self.want.get("authenticationPolicyServer")) - auth_server_params.update({"id": self.have.get("authenticationPolicyServer").get("id")}) - self.log("Desired State for Authentication and Policy Server (want): {0}" - .format(auth_server_params), "DEBUG") - self.log("Current State for Authentication and Policy Server (have): {0}" - .format(self.have.get("authenticationPolicyServer").get("details")), "DEBUG") - function_name = "edit_authentication_and_policy_server_access_configuration" - response = self.dnac._exec( - family="system_settings", - function=function_name, - params=auth_server_params, - ) - validation_string_set = ("successfully updated aaa settings", "operation sucessful") - self.check_auth_server_response_status(response, validation_string_set, function_name) - if self.status == "failed": - self.log(self.msg, "ERROR") - return - - self.log("Authentication and Policy Server '{0}' updated successfully" - .format(ipAddress), "INFO") - result_auth_server.get("response").get(ipAddress) \ - .update({"Id": self.have.get("authenticationPolicyServer").get("id")}) - result_auth_server.get("msg").update({ - ipAddress: "Authentication and Policy Server Updated Successfully" - }) + return def get_diff_merged(self, config): @@ -1403,61 +1428,67 @@ def get_diff_merged(self, config): Cisco Catalyst Center based on the playbook details. Parameters: - config (list of dict) - Playbook details containing + config (list of Dict) - Playbook details containing Authentication and Policy Server information. Returns: self """ - if config.get("authentication_policy_server") is not None: - ipAddress = config.get("authentication_policy_server").get("server_ip_address") - self.update_auth_policy_server(ipAddress) + authentication_policy_server = config.get("authentication_policy_server") + if authentication_policy_server is not None: + self.update_auth_policy_server(authentication_policy_server) return self - def delete_auth_policy_server(self, ipAddress): + def delete_auth_policy_server(self, authentication_policy_server): """ Delete a Authentication and Policy Server by server Ip address in Cisco Catalyst Center. Parameters: - ipAddress (str) - The Ip address of the Authentication and Policy Server to be deleted. + authentication_policy_server (List of Dict) - Playbook details of the Authentication and Policy Server. Returns: self """ - auth_server_exists = self.have.get("authenticationPolicyServer").get("exists") result_auth_server = self.result.get("response")[0].get("authenticationPolicyServer") - if not auth_server_exists: - result_auth_server.get("response").update({ - ipAddress: "Authentication and Policy Server not found" - }) - self.msg = "Authentication and Policy Server not found." - self.status = "success" - return self + auth_server_index = 0 + for item in authentication_policy_server: + ipAddress = item.get("server_ip_address") + auth_server_exists = self.have.get("authenticationPolicyServer")[auth_server_index].get("exists") + if not auth_server_exists: + result_auth_server.get("msg").update({ + ipAddress: "Authentication and Policy Server not found." + }) + self.msg = "Authentication and Policy Server not found." + self.status = "success" + continue - response = self.dnac._exec( - family="system_settings", - function="delete_authentication_and_policy_server_access_configuration", - params={"id": self.have.get("authenticationPolicyServer").get("id")}, - ) + response = self.dnac._exec( + family="system_settings", + function="delete_authentication_and_policy_server_access_configuration", + params={"id": self.have.get("authenticationPolicyServer")[auth_server_index].get("id")}, + ) - self.log("Received API response for 'delete_authentication_and_" - "policy_server_access_configuration': {0}".format(response), "DEBUG") + self.log("Received API response for 'delete_authentication_and_" + "policy_server_access_configuration': {0}".format(response), "DEBUG") - # Check the task status - validation_string = "successfully deleted aaa settings" - self.check_task_response_status(response, validation_string, "delete_authentication_and_policy_server_access_configuration").check_return_status() - taskid = response.get("response").get("taskId") + # Check the task status + validation_string = "successfully deleted aaa settings" + self.check_task_response_status(response, validation_string, "delete_authentication_and_policy_server_access_configuration").check_return_status() + taskid = response.get("response").get("taskId") - # Update result information - result_auth_server.get("response").update({ipAddress: {}}) - result_auth_server.get("response").get(ipAddress).update({"Task Id": taskid}) - result_auth_server.get("msg").update({ - ipAddress: "Authentication and Policy Server deleted successfully." - }) - self.msg = "Authentication and Policy Server - {0} deleted successfully.".format(ipAddress) + # Update result information + result_auth_server.get("response").update({ipAddress: {}}) + result_auth_server.get("response").get(ipAddress).update({"Task Id": taskid}) + result_auth_server.get("msg").update({ + ipAddress: "Authentication and Policy Server deleted successfully." + }) + self.log("Authentication and Policy Server - {0} deleted successfully.".format(ipAddress)) + auth_server_index += 1 + + self.msg = "Authentication and Policy Server(s) deleted successfully." self.status = "success" return self @@ -1472,9 +1503,9 @@ def get_diff_deleted(self, config): self """ - if config.get("authentication_policy_server") is not None: - ipAddress = config.get("authentication_policy_server").get("server_ip_address") - self.delete_auth_policy_server(ipAddress).check_return_status() + authentication_policy_server = config.get("authentication_policy_server") + if authentication_policy_server is not None: + self.delete_auth_policy_server(authentication_policy_server).check_return_status() return self @@ -1498,23 +1529,26 @@ def verify_diff_merged(self, config): self.log("Desired State of Authentication and Policy Server (want): {0}" .format(self.want.get("authenticationPolicyServer")), "DEBUG") self.log("Current State of Authentication and Policy Server (have): {0}" - .format(self.have.get("authenticationPolicyServer") - .get("details")), "DEBUG") + .format(self.have.get("authenticationPolicyServer")), "DEBUG") check_list = ["isIseEnabled", "ipAddress", "pxgridEnabled", "useDnacCertForPxgrid", "port", "protocol", "retries", "role", "timeoutSeconds", "encryptionScheme"] - auth_server_have = self.have.get("authenticationPolicyServer").get("details") + auth_server_have = self.have.get("authenticationPolicyServer") auth_server_want = self.want.get("authenticationPolicyServer") - for item in check_list: - if auth_server_have.get(item) and auth_server_want.get(item) and \ - auth_server_have.get(item) != auth_server_want.get(item): - self.msg = "Authentication and Policy Server " + \ - "Config is not applied to the Cisco Catalyst Center." - self.status = "failed" - return self + auth_server_index = 0 + total_item_in_config = len(config) + while(auth_server_index < total_item_in_config): + for value in check_list: + if auth_server_have[auth_server_index].get("details").get(value) and auth_server_want[auth_server_index].get(value) and \ + auth_server_have[auth_server_index].get("details").get(value) != auth_server_want[auth_server_index].get(value): + self.msg = ("Authentication and Policy Server Config of IP address '{0}' is not " + "applied to the Cisco Catalyst Center.".format(config[auth_server_index].get("server_ip_address"))) + self.status = "failed" + return self - self.log("Successfully validated Authentication and Policy Server '{0}'." - .format(self.want.get("authenticationPolicyServer").get("ipAddress")), "INFO") + auth_server_index += 1 + + self.log("Successfully validated Authentication and Policy Server(s).", "INFO") self.result.get("response")[0].get("authenticationPolicyServer").update({ "Validation": "Success" }) @@ -1537,25 +1571,31 @@ def verify_diff_deleted(self, config): """ self.get_have(config) - ipAddress = config.get("authentication_policy_server").get("server_ip_address") self.log("Current State (have): {0}".format(self.have), "INFO") - self.log("Authentication and Policy Server deleted from the Cisco Catalyst Center: {0}" - .format(ipAddress), "INFO") - if config.get("authentication_policy_server") is not None: - auth_server_exists = self.have.get("authenticationPolicyServer").get("exists") - if auth_server_exists: - self.msg = "Authentication and Policy Server " + \ - "Config is not applied to the Cisco Catalyst Center." - self.status = "failed" - return self + auth_server_index = 0 + authentication_policy_server = config.get("authentication_policy_server") + for item in authentication_policy_server: + ip_address = item.get("server_ip_address") + self.log("Authentication and Policy Server deleted from the Cisco Catalyst Center: {0}" + .format(ip_address), "INFO") + if item is not None: + auth_server_exists = self.have.get("authenticationPolicyServer")[auth_server_index].get("exists") + if auth_server_exists: + self.msg = ("Authentication and Policy Server with IP '{0}' " + "config is not applied to the Cisco Catalyst Center.".format(ip_address)) + self.status = "failed" + return self - self.log("Successfully validated absence of Authentication and Policy Server '{0}'." - .format(config.get("authentication_policy_server").get("ip_address")), "INFO") - self.result.get("response")[0].get("authenticationPolicyServer").update({ - "Validation": "Success" - }) + self.log("Successfully validated absence of Authentication and Policy Server '{0}'." + .format(ip_address), "INFO") + + auth_server_index += 1 + + self.result.get("response")[0].get("authenticationPolicyServer").update({ + "Validation": "Success" + }) - self.msg = "Successfully validated the absence of Authentication and Policy Server." + self.msg = "Successfully validated the absence of Authentication and Policy Server(s)." self.status = "success" return self From 3e7ba11a4a264c5484a05d3e91131a20423f13f6 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 15 Jul 2024 11:58:45 +0530 Subject: [PATCH 074/119] Resolved the sanity issue --- plugins/modules/ise_radius_integration_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 579deb6ee5..483719c81d 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -1537,7 +1537,7 @@ def verify_diff_merged(self, config): auth_server_want = self.want.get("authenticationPolicyServer") auth_server_index = 0 total_item_in_config = len(config) - while(auth_server_index < total_item_in_config): + while auth_server_index < total_item_in_config: for value in check_list: if auth_server_have[auth_server_index].get("details").get(value) and auth_server_want[auth_server_index].get(value) and \ auth_server_have[auth_server_index].get("details").get(value) != auth_server_want[auth_server_index].get(value): From 1858375104d26107929b725c391708d2555f1857 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 15 Jul 2024 12:49:58 +0530 Subject: [PATCH 075/119] Addressed the review comments --- ...ise_radius_integration_workflow_manager.py | 28 ++++++++++--------- 1 file changed, 15 insertions(+), 13 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 483719c81d..232cbc273d 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -680,25 +680,25 @@ def get_have_authentication_policy_server(self, authentication_policy_server): all_auth_server_details = [] for item in authentication_policy_server: - AuthServer = { + auth_server = { "exists": False, "details": None, "id": None } ip_address = item.get("server_ip_address") if ip_address is None: - self.msg = "Missing parameter 'server_ip_address' is required." + self.msg = "The parameter 'server_ip_address' is missing but required." self.status = "failed" return self - AuthServer = self.auth_server_exists(ip_address) + auth_server = self.auth_server_exists(ip_address) self.log("Authentication and Policy Server exists for '{0}': {1}" - .format(ip_address, AuthServer.get("exists")), "DEBUG") + .format(ip_address, auth_server.get("exists")), "DEBUG") self.log("Authentication and Policy Server details for '{0}': {1}" - .format(ip_address, AuthServer.get("details")), "DEBUG") + .format(ip_address, auth_server.get("details")), "DEBUG") self.log("Authentication and Policy Server Id for '{0}': {1}" - .format(ip_address, AuthServer.get("id")), "DEBUG") - all_auth_server_details.append(AuthServer) + .format(ip_address, auth_server.get("id")), "DEBUG") + all_auth_server_details.append(auth_server) self.have.update({"authenticationPolicyServer": all_auth_server_details}) self.msg = "Collecting the Authentication and Policy Server " + \ @@ -723,7 +723,7 @@ def get_have(self, config): if authentication_policy_server is not None: self.get_have_authentication_policy_server(authentication_policy_server).check_return_status() else: - self.msg = "authentication_policy_server in config is missing in the playbook" + self.msg = "The 'authentication_policy_server' is missing in the playbook configuration." self.status = "failed" return self @@ -757,7 +757,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if not auth_server_exists: server_type = item.get("server_type") if server_type not in ["ISE", "AAA", None]: - self.msg = "The server_type should either be ISE or AAA but not {0}.".format(server_type) + self.msg = "The server_type should be either 'ISE' or 'AAA' but {0} was provided.".format(server_type) self.status = "failed" return self @@ -775,7 +775,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if not auth_server_exists: shared_secret = item.get("shared_secret") if not shared_secret: - self.msg = "Missing parameter 'shared_secret' is required." + self.msg = "The required parameter 'shared_secret' is missing." self.status = "failed" return self @@ -796,8 +796,10 @@ def get_want_authentication_policy_server(self, auth_policy_server): protocol = item.get("protocol") if protocol not in ["RADIUS", "TACACS", "RADIUS_TACACS", None]: - self.msg = "protocol should either be ['RADIUS', 'TACACS', 'RADIUS_TACACS']." + \ - "It should not be {0}".format(protocol) + self.msg = ( + "The 'protocol' should be one of ['RADIUS', 'TACACS', 'RADIUS_TACACS'], " + "not '{0}'.".format(protocol) + ) self.status = "failed" return self @@ -825,7 +827,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if encryption_scheme == "KEYWRAP": message_key = item.get("message_authenticator_code_key") if not message_key: - self.msg = "The 'message_authenticator_code_key' should not be empty if the encryption_scheme is 'KEYWRAP'." + self.msg = "The 'message_authenticator_code_key' must not be empty when the 'encryption_scheme' is set to 'KEYWRAP'." self.status = "failed" return self From 32dfc728aa03507e09ada4355d0f8c68383bba83 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 15 Jul 2024 12:57:25 +0530 Subject: [PATCH 076/119] user and role workflow files added --- playbooks/user_role_workflow_manager.yml | 135 + plugins/modules/user_role_workflow_manager.py | 3228 +++++++++++++++++ 2 files changed, 3363 insertions(+) create mode 100644 playbooks/user_role_workflow_manager.yml create mode 100644 plugins/modules/user_role_workflow_manager.py diff --git a/playbooks/user_role_workflow_manager.yml b/playbooks/user_role_workflow_manager.yml new file mode 100644 index 0000000000..094a5858ea --- /dev/null +++ b/playbooks/user_role_workflow_manager.yml @@ -0,0 +1,135 @@ +--- +- name: Configure device credentials on Cisco DNA Center + hosts: localhost + vars_files: + - "credentials.yml" + connection: local + gather_facts: no + tasks: + - name: User and Role Workflow Manager + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{dnac_host}}" + dnac_username: "{{dnac_username}}" + dnac_password: "{{dnac_password}}" + dnac_verify: "{{dnac_verify}}" + dnac_port: "{{dnac_port}}" + dnac_version: "{{dnac_version}}" + dnac_debug: "{{dnac_debug}}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + user_details: + - first_name: "ajith" + last_name: "andrew" + username: "ajithandrewj" + email: "ajith.andrew@example.com" + password: "Ajith@123" + role_list: ["Super-Admin-Role"] + - first_name: "syed" + last_name: "khadeer" + username: "syedkhadeer" + email: "syedkhadeer@example.com" + password: "Syedkhadeer@123" + role_details: + - role_name: "Test_Role_1" + description: "Default role creation" + assurance: + - overall: "read" + troubleshooting_tools: "write" + network_analytics: + - overall: "deny" + network_design: + - overall: "deny" + image_repository: "read" + network_provision: + - overall: "read" + eox: "write" + image_update: "read" + inventory_management: + - overall: "write" + port_management: "read" + network_services: + - overall: "deny" + bonjour: "Write" + platform: + - overall: "deny" + bundles: "read" + security: + - overall: "deny" + ip_based_access_control: "read" + security_advisories: "deny" + system: + - overall: "deny" + machine_reasoning: "write" + system_management: "deny" + utilities: + - overall: "deny" + audit_log: "read" + + # role_details: + # - role_name: "Test_Role_1" + # description: "Default role creation" + # assurance: + # - overall: "write" + # monitoring_and_troubleshooting: "write" + # monitoring_settings: "write" + # troubleshooting_tools: "deny" + # network_analytics: + # - data_access: "read" + # network_design: + # - overall: "write" + # advanced_network_settings: "write" + # image_repository: "write" + # network_hierarchy: "deny" + # network_profiles: "read" + # network_settings: "deny" + # virtual_network: "read" + # network_provision: + # - overall: "write" + # compliance: "write" + # eox: "write" + # image_update: "deny" + # inventory_management: + # - overall: "write" + # device_configuration: "write" + # discovery: "read" + # network_device: "write" + # port_management: "deny" + # topology: "write" + # license: "write" + # network_telemetry: "write" + # pnp: "read" + # provision: "deny" + # network_services: + # - overall: "write" + # app_hosting: "write" + # bonjour: "write" + # stealthwatch: "deny" + # umbrella: "write" + # platform: + # - overall: "write" + # apis: "write" + # bundles: "deny" + # events: "read" + # reports: "write" + # security: + # - overall: "write" + # group_based_policy: "read" + # ip_based_access_control: "read" + # security_advisories: "deny" + # system: + # - overall: "write" + # machine_reasoning: "read" + # system_management: "deny" + # utilities: + # - overall: "write" + # audit_log: "read" + # event_viewer: "read" + # network_reasoner: "write" + # remote_device_support: "write" + # scheduler: "write" + # search: "write" diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py new file mode 100644 index 0000000000..4f1812fb48 --- /dev/null +++ b/plugins/modules/user_role_workflow_manager.py @@ -0,0 +1,3228 @@ +# !/usr/bin/python +# -*- coding: utf-8 -*- +# Copyright (c) 2024, Cisco Systems +# GNU General Public License v3.0+ (see LICENSE or https://www.gnu.org/licenses/gpl-3.0.txt) + +from __future__ import absolute_import, division, print_function +__metaclass__ = type +__author__ = ("Ajith Andrew J, Syed khadeer Ahmed") + +DOCUMENTATION = r""" +--- +module: user_role_workflow_manager +short_description: Resource module for managing users and roles in Cisco Catalyst Center +description: + - Manages operations to create, update, and delete users and roles in Cisco Catalyst Center + - Provides APIs to create, update, and delete users and roles +version_added: "6.17.0" +extends_documentation_fragment: + - cisco.dnac.workflow_manager_params +author: + - Ajith Andrew J (@ajithandrewj) + - Syed Khadeer Ahmed (@syed-khadeerahmed) + - Rangaprabhu Deenadayalu (@rangaprabha-d) +options: + config_verify: + description: Set to True to verify the Cisco Catalyst Center after applying the playbook config + type: bool + default: False + state: + description: The state of Cisco Catalyst Center after module completion + type: str + choices: ["merged", "deleted"] + default: merged + config: + description: Dict of user or role details being managed + type: dict + required: true + suboptions: + user_details: + description: Manages the user details + type: list + elements: dict + suboptions: + username: + description: The username for the user's account + type: str + first_name: + description: The first name of the user + type: str + last_name: + description: The last name of the user + type: str + email: + description: + - The email address of the user (e.g., syedkhadeerahmed@example.com) + - Used to fetch user data if the username is forgotten + - Required for user deletion if the username is forgotten + type: str + password: + description: + - The password for the user's account. Must contain at least one special character, + one capital letter, one lowercase letter, and a minimum length of 15 characters + - Required for user creation + type: str + role_list: + description: + - Default Role "Observer-role" + - A role name assigned to the user. It must match exactly with the role in Cisco Catalyst Center + - Required for user creation and updates + type: list + elements: str + role_details: + description: Manages the role details + type: list + elements: dict + suboptions: + role_name: + description: Name of the role + type: str + description: + description: Description for the role + type: str + assurance: + description: Assure consistent service levels with complete visibility across all aspects of your network + choices: ["deny", "read", "write"] + default: "read" + suboptions: + overall: + description: Provides the same choice for all sub-parameters + choices: ["deny", "read", "write"] + default: "read" + monitoring_and_troubleshooting: + description: + - Monitor and manage the health of your network with issue troubleshooting + and remediation, proactive network monitoring, and insights driven by AI Network Analytics + choices: ["deny", "read", "write"] + default: "read" + type: str + monitoring_settings: + description: + - Configure and manage issues. Update network, client, and application health thresholds + - You must have at least Read permission on Monitoring and Troubleshooting + choices: ["deny", "read", "write"] + default: "read" + type: str + troubleshooting_tools: + description: + - Create and manage sensor tests. Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients + - You must have at least Read permission on Monitoring and Troubleshooting + choices: ["deny", "read", "write"] + default: "read" + type: str + network_analytics: + description: Manage network analytics-related components + suboptions: + overall: + description: Provides the same choice for all sub-parameters + choices: ["deny", "read", "write"] + default: "read" + data_access: + description: + - Enable access to query engine APIs. Control functions such as global search, rogue management, and aWIPS + - Setting the permission to Deny affects Search and Assurance functionality + choices: ["deny", "read", "write"] + default: "read" + type: str + network_design: + description: Set up the network hierarchy, update your software image repository, + and configure network profiles and settings for managing your sites and network devices + suboptions: + overall: + description: Provides the same choice for all sub-parameters + choices: ["deny", "read", "write"] + default: "read" + advanced_network_settings: + description: + - Update network settings, such as global device credentials, authentication and policy servers, + certificates, trustpool, cloud access keys, Stealthwatch, Umbrella, and data anonymization + - Export the device inventory and its credentials + - To complete this task, you must have Read permission on Network Settings + choices: ["deny", "read", "write"] + default: "read" + type: str + image_repository: + description: Manage software images and facilitate upgrades and updates on physical and virtual network entities + choices: ["deny", "read", "write"] + default: "read" + type: str + network_hierarchy: + description: Define and create a network hierarchy of sites, buildings, floors, and areas based on geographic location. + network_profiles: + description: + - Create network profiles for routing, switching, and wireless. Assign profiles to sites. + This role includes Template Editor, Tagging, Model Config Editor, and Authentication Template. + - To create SSIDs, you must have Write permission on Network Settings. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_settings: + description: + - Common site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. + - Users with this role can add an SFTP server and modify the Network Resync Interval in System > Settings. + - To create wireless profiles, you must have Write permission on Network Profiles. + choices: ["deny", "read", "write"] + default: "read" + type: str + virtual_network: + description: Manage virtual networks (VNs). Segment physical networks into multiple logical networks + for traffic isolation and controlled inter-VN communication. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_provision: + description: Configure, upgrade, provision, and manage your network devices. + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + compliance: + description: Manage compliance provisioning. + choices: ["deny", "read", "write"] + default: "read" + type: str + exo: + description: Scan the network for details on publicly announced information pertaining to the End of Life, End of Sales, + or End of Support of the hardware and software in your network. + choices: ["deny", "read", "write"] + default: "read" + type: str + image_update: + description: Upgrade software images on devices that don't match the Golden Image settings after a complete upgrade lifecycle + choices: ["deny", "read", "write"] + default: "read" + type: str + inventory_management: + description: + - Discover, add, replace, or delete devices on your network while managing device attributes and configuration properties. + - To replace a device, you must have Write permission. + - Network Provision > PnP. + type: list + elements: dict + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + device_configuration: + description: Display the running configuration of a device. + choices: ["deny", "read", "write"] + default: "read" + type: str + discovery: + description: Display the running configuration of a device. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_device: + description: Add devices from Inventory, view device details, and perform device-level actions. + choices: ["deny", "read", "write"] + default: "read" + type: str + port_management: + description: Allow port actions on a device. + choices: ["deny", "read", "write"] + default: "read" + type: str + topology: + description: + - Display network device and link connectivity. Manage device roles, tag devices, customize the display, and save custom topology layouts. + - To view the SD-Access Fabric window, you must have at least Read permission on Network Provision > Inventory Management > Topology. + choices: ["deny", "read", "write"] + default: "read" + type: str + license: + description: + - Unified view of your software and network assets relative to license usage and compliance. + - The role also controls permissions for cisco.com and Smart accounts. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_telemetry: + description: + - Enable or disable the collection of application telemetry from devices. + - Configure the telemetry settings associated with the assigned site. + - Configure other settings like wireless service assurance and controller certificates. + - To enable or disable network telemetry, you must have Write permission on Provision. + choices: ["deny", "read", "write"] + default: "read" + type: str + pnp: + description: Automatically onboard new devices, assign them to sites, and configure them with site-specific contextual settings. + choices: ["deny", "read", "write"] + default: "read" + type: str + provision: + description: + - Provision devices with the site-specific settings and policies that are configured for the network. + - This role includes Fabric, Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, + Stealthwatch, Sync Start vs Run Configuration, and Umbrella provisioning. + - On the main dashboards for rogue and aWIPS, you can enable or disable certain actions, including rogue containment. + - To provision devices, you must have Write permission on Network Design and Network Provision. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_services: + description: Configure additional capabilities on the network beyond basic network connectivity and access. + default: "read" + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + app_hosting: + description: Deploy, manage, and monitor virtualized and container-based applications running on network devices. + choices: ["deny", "read", "write"] + default: "read" + type: str + bonjour: + description: Enable the Wide Area Bonjour service across your network to enable policy-based service discovery. + choices: ["deny", "read", "write"] + default: "read" + type: str + stealthwatch: + description: + - Configure network elements to send data to Cisco Stealthwatch to detect and mitigate threats, even in encrypted traffic. + - To provision Stealthwatch, you must have Write permission on the following components. + - Network Design > Network Settings + - Network Provision > Provision + - Network Services > Stealthwatch + - Network Design > Advanced Settings + choices: ["deny", "read", "write"] + default: "read" + type: str + umbrella: + description: + - Configure network elements to use Cisco Umbrella as the first line of defense against cybersecurity threats. + - To provision Umbrella, you must have Write permission on the following components + - Network Design > Network Settings + - Network Provision > Provision + - Network Provision > Scheduler + - Network Services > Umbrella + choices: ["deny", "read", "write"] + default: "read" + type: str + platform: + description: Open platform for accessible, intent-based workflows, data exchange, notifications, and third-party app integrations. + default: "deny" + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + apis: + description: Drive value by accessing Cisco Catalyst Center through REST APIs. + choices: ["deny", "read", "write"] + default: "deny" + type: str + bundles: + description: Enhance productivity by configuring and activating preconfigured bundles for ITSM integration. + choices: ["deny", "read", "write"] + default: "deny" + type: str + events: + description: + - Subscribe to get notified in near real time about network and system events of interest and initiate corrective actions. + - You can configure email and syslog logs in System > Settings > Destinations. + choices: ["deny", "read", "write"] + default: "deny" + type: str + reports: + description: + - Generate reports using predefined reporting templates for all aspects of your network. + - Generate reports for rogue devices and for aWIPS. + - You can configure webhooks in System > Settings > Destinations. + choices: ["deny", "read", "write"] + default: "deny" + type: str + security: + description: Manage and control secure access to the network. + default: "read" + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + group_based_policy: + description: + - Manage group-based policies for networks that enforce segmentation and access control based on Cisco security group tags. + - This role includes Endpoint Analytics. + choices: ["deny", "read", "write"] + default: "read" + type: str + ip_based_access_control: + description: Manage IP-based access control lists that enforce network segmentation based on IP addresses. + choices: ["deny", "read", "write"] + default: "read" + type: str + security_advisories: + description: Scan the network for security advisories. Review and understand the impact of published + Cisco security advisories that may affect your network. + choices: ["deny", "read", "write"] + default: "read" + type: str + system: + description: Centralized administration of Cisco Catalyst Center, which includes configuration management, + network connectivity, software upgrades, and more. + default: "read" + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + default: "read" + type: str + machine_reasoning: + description: Configure automatic updates to the machine reasoning knowledge base to rapidly identify + security vulnerabilities and improve automated issue analysis. + choices: ["deny", "read", "write"] + default: "read" + type: str + system_management: + description: + - Manage core system functionality and connectivity settings. Manage user roles and configure external authentication. + - This role includes Cisco Credentials, Integrity Verification, Device EULA, HA, Integration Settings, Disaster Recovery, + Debugging Logs, Telemetry Collection, System EULA, IPAM, vManage Servers, Cisco AI Analytics, Backup & Restore, and Data Platform. + choices: ["deny", "read", "write"] + default: "read" + type: str + utilities: + description: One-stop-shop productivity resource for the most commonly used troubleshooting tools and services. + suboptions: + overall: + description: It gives the same choice for all sub-parameters. + choices: ["deny", "read", "write"] + type: str + audit_log: + description: Detailed log of changes made via UI or API interface to network devices or Cisco Catalyst Center. + choices: ["deny", "read", "write"] + default: "deny" + type: str + event_viewer: + description: View network device and client events for troubleshooting. + choices: ["deny", "read", "write"] + default: "read" + type: str + network_reasoner: + description: + - Allow the Cisco support team to remotely troubleshoot the network devices managed by Cisco Catalyst Center. + - With this role enabled, an engineer from the Cisco Technical Assistance Center TAC can connect remotely to a + customer's Cisco Catalyst Center setup for troubleshooting purposes. + choices: ["deny", "read", "write"] + default: "read" + type: str + remote_device_support: + description: Allow Cisco support team to remotely troubleshoot any network devices managed by Cisco DNA Center. + choices: ["deny", "read", "write"] + default: "read" + type: str + scheduler: + description: Integrated with other back-end services, scheduler lets you run, schedule, and monitor network tasks and + activities such as deploy policies, provision, or upgrade the network. + choices: ["deny", "read", "write"] + default: "read" + type: str + search: + description: Search for various objects in Cisco Catalyst Center, such as sites, network devices, clients, applications, + policies, settings, tags, menu items, and more. + choices: ["deny", "read", "write"] + default: "read" + type: str +requirements: + - dnacentersdk >= 2.7.1 + - python >= 3.10 +notes: + - SDK Methods used + - user_and_roles.UserandRoles.get_user_ap_i + - user_and_roles.UserandRoles.add_user_ap_i + - user_and_roles.UserandRoles.update_user_ap_i + - user_and_roles.UserandRoles.delete_user_ap_i + - Paths used + - get /dna/system/api/v1/user + - post /dna/system/api/v1/user + - put /dna/system/api/v1/user + - delete /dna/system/api/v1/user/{userId} +""" + +EXAMPLES = r""" +--- +- name: Create a user + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + - user_details: + - username: "ajithandrewj" + first_name: "ajith" + last_name: "andrew" + email: "ajith.andrew@example.com" + password: "Ajith@123" + role_list: ["SUPER-ADMIN-ROLE"] + +- name: Update a user for first name, last name, email, and role list + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + - user_details: + - username: "ajithandrewj" + first_name: "ajith" + last_name: "andrew" + email: "ajith.andrew@example.com" + role_list: ["SUPER-ADMIN-ROLE"] + +- name: Update a user for role list + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + - user_details: + - username: "ajithandrewj" + role_list: ["NETWORK-ADMIN-ROLE"] + +- name: Delete a user + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + - user_details: + username: "ajithandrewj" + email: "ajith.andrew@example.com" + +- name: Create a role with all params + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + role_based_access_control: + - role_name: "role_name" + description: "role_description" + assurance: + - monitoring_and_troubleshooting: "write" + monitoring_settings: "read" + troubleshooting_tools: "deny" + network_analytics: + data_access: "write" + network_design: + - advanced_network_settings: "deny" + image_repository: "deny" + network_hierarchy: "deny" + network_profiles: "write" + network_settings: "write" + virtual_network: "read" + network_provision: + - compliance: "deny" + image_update: "write" + inventory_management: + - device_configuration: "write" + discovery: "deny" + network_device: "read" + port_management: "write" + topology: "write" + license: "write" + network_telemetry: "write" + pnp: "deny" + provision: "read" + network_services: + - app_hosting: "deny" + bonjour: "write" + stealthwatch: "read" + umbrella: "deny" + platform: + - apis: "write" + bundles: "write" + events: "write" + reports: "read" + security: + - group_based_policy: "read" + ip_based_access_control: "write" + security_advisories: "write" + system: + - machine_reasoning: "read" + system_management: "write" + utilities: + - audit_log: "read" + event_viewer: "deny" + network_reasoner: "write" + scheduler: "read" + search: "write" + +- name: Create a role for assurance + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + role_based_access_control: + - role_name: "role_name" + description: "role_description" + assurance: + - overall: "write" + monitoring_and_troubleshooting: "read" + +- name: Create a role for network provision + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + role_based_access_control: + - role_name: "role_name" + description: "role_description" + network_provision: + - compliance: "deny" + image_update: "write" + inventory_management: + - overall: "read" + device_configuration: "write" + license: "write" + network_telemetry: "write" + pnp: "deny" + provision: "read" + +- name: Update a role for assurance and platform + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + config: + role_details: + - role_name: "role_name" + assurance: + - overall: "deny" + platform: + - apis: "write" + bundles: "write" + events: "write" + reports: "read" + +- name: Delete a role + cisco.dnac.user_role_workflow_manager: + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: True + dnac_log_level: DEBUG + config_verify: True + dnac_api_task_timeout: 1000 + dnac_task_poll_interval: 1 + state: merged + config: + - role_details: + rolename: "role_name" +""" + +RETURN = r""" +# Case 1: Successful creation of user +response_1: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "message": "string", + "userId": "string" + } + } + +# Case 2: Successful updation of user +response_2: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "message": "string" + } + } + +# Case 3: Successful deletion of user +response_3: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "message": "string" + } + } + +# Case 4: User exists and no action needed (for update) +response_4: + description: A dictionary with existing user details indicating no update needed. + returned: always + type: dict + sample: + { + "response": { + "user": { + "email": "user@example.com", + "first_name": "John", + "last_name": "Doe", + "username": "johndoe", + "role_list": ["NETWORK-ADMIN-ROLE"] + }, + "userId": "string", # User ID from Cisco Catalyst Center + "type": "string" + }, + "msg": "User already exists and no update needed." + } + +# Case 5: Error during user operation (create/update/delete) +response_5: + description: A dictionary with details of the API execution and error information. + returned: always + type: dict + sample: + { + "response": { + "msg": "Error during creating, updating or deleting the user." + } + } + +# Case 6: User not found (during delete operation) +response_6: + description: A dictionary indicating user not found during delete operation. + returned: always + type: dict + sample: + { + "response": { + "msg": "User not found." + } + } + +# Case 7: Successful creation of role +response_7: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "roleid": "string", + "message": "string" + } + } + +# Case 8: Successful updation of role +response_8: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "roleId": "string", + "message": "string" + } + } + +# Case 9: Successful deletion of role +response_9: + description: A dictionary with details of the API execution from Cisco Catalyst Center. + returned: always + type: dict + sample: + { + "response": { + "message": "string" + } + } + +# Case 10: Error during role operation (create/update/delete) +response_10: + description: A dictionary with details of the API execution and error information. + returned: always + type: dict + sample: + { + "response": { + "msg": "Error during creating, updating or deleting the role." + } + } + +# Case 11: Role not found (during delete operation) +response_11: + description: A dictionary indicating role not found during delete operation. + returned: always + type: dict + sample: + { + "response": { + "msg": "Role not found." + } + } +""" + +import re +from ansible_collections.cisco.dnac.plugins.module_utils.dnac import ( + DnacBase, + validate_list_of_dicts, + validate_str, + validate_list +) +from ansible.module_utils.basic import AnsibleModule + + +class UserandRole(DnacBase): + """Class containing member attributes for user workflow_manager module""" + + def __init__(self, module): + super().__init__(module) + self.result["response"] = [] + self.supported_states = ["merged", "deleted"] + self.payload = module.params + self.keymap = {} + + def validate_input_yml(self, user_role_details): + """ + Validate the fields provided in the yml files. + Checks the configuration provided in the playbook against a predefined specification + to ensure it adheres to the expected structure and data types based on input. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Returns: + The method returns an instance of the class with updated attributes: + - self.msg: A message describing the validation result. + - self.status: The status of the validation (either "success" or "failed"). + - self.validated_config: If successful, a validated version of the "config" parameter. + Description: + - To use this method, create an instance of the class and call "validate_input_yml" on it. + - If the validation succeeds, "self.status" will be "success" and "self.validated_config" will contain the validated + configuration. If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. + - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. + """ + + self.log("Validating the Playbook Yaml File..", "INFO") + self.log(user_role_details) + + if user_role_details is None or isinstance(user_role_details, dict): + self.msg = "Configuration is not available in the playbook for validation or user/role details are not type list" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + try: + if "role_name" in user_role_details[0] and user_role_details[0].get("role_name") is not None: + rolelist = user_role_details + rolelist = self.camel_to_snake_case(rolelist) + role_details = dict(role_name=dict(required=True, type="str"), + description=dict(required=False, type="str"), + assurance=dict(required=False, type="list", elements="dict"), + network_analytics=dict(required=False, type="list", elements="dict"), + network_design=dict(required=False, type="list", elements="dict"), + network_provision=dict(required=False, type="list", elements="dict"), + network_services=dict(required=False, type="list", elements="dict"), + platform=dict(required=False, type="list", elements="dict"), + security=dict(required=False, type="list", elements="dict"), + system=dict(required=False, type="list", elements="dict"), + utilities=dict(required=False, type="list", elements="dict") + ) + valid_param, invalid_param = validate_list_of_dicts(rolelist, role_details) + + if invalid_param: + self.msg("Invalid param found in playbook: {0}".format(", ".join(invalid_param))) + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + self.validated_config = valid_param + self.msg = "Successfully validated playbook config params: {0}".format(str(valid_param[0])) + self.log(self.msg, "INFO") + self.status = "success" + return self + + elif "username" in user_role_details[0] or "email" in user_role_details[0]: + userlist = user_role_details + userlist = self.camel_to_snake_case(userlist) + user_details = dict(first_name=dict(required=False, type="str"), + last_name=dict(required=False, type="str"), + email=dict(required=False, type="str"), + password=dict(required=False, type="str"), + username=dict(required=False, type="str"), + role_list=dict(required=False, type="list", elements="str"), + ) + + valid_param, invalid_param = validate_list_of_dicts(userlist, user_details) + + if invalid_param: + self.msg("Invalid param found in playbook: {0}".format(", ".join(invalid_param))) + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + self.validated_config = valid_param + self.msg = "Successfully validated playbook config params:{0}".format(str(valid_param[0])) + self.log(self.msg, "INFO") + self.status = "success" + return self + + else: + self.msg = "Configuration params like username or email or role_name is not available in the playbook" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + except Exception: + self.msg = "Any of the role parameters like assurance, network_analytics, network_design, etc.. are not type list" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + def valid_role_config_parameters(self, role_config): + """ + Addtional validation for the create role configuration payload. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - ap_config (dict): A dictionary containing the input configuration details. + Returns: + The method returns an instance of the class with updated attributes: + - self.msg: A message describing the validation result. + - self.status: The status of the validation (either "success" or "failed"). + Description: + - To use this method, create an instance of the class and call "valid_role_config_parameters" on it. + - If the validation succeeds it return "success". + - If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. + - To use this method, create an instance of the class and call "valid_role_config_parameters" on it. + - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. + """ + + errormsg = [] + + if role_config.get("role_name"): + role_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + if not role_name_regex.match(role_config["role_name"]): + errormsg.append("""Role name: role_name must only contain letters, numbers, underscores, + and hyphens and should not contain spaces or other special characters""") + + if role_config.get("description"): + param_spec = dict(type="str", length_max=255) + validate_str(role_config["description"], param_spec, "description", errormsg) + + assurance_list = role_config.get("assurance", []) + + if assurance_list: + for assurance_dict in assurance_list: + if assurance_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(assurance_dict["overall"], param_spec, "overall", errormsg) + + if assurance_dict.get("monitoring_and_troubleshooting"): + param_spec = dict(type="str", length_max=255) + validate_str(assurance_dict["monitoring_and_troubleshooting"], param_spec, "monitoring_and_troubleshooting", errormsg) + + if assurance_dict.get("monitoring_settings"): + param_spec = dict(type="str", length_max=255) + validate_str(assurance_dict["monitoring_settings"], param_spec, "monitoring_settings", errormsg) + + if assurance_dict.get("troubleshooting_tools"): + param_spec = dict(type="str", length_max=255) + validate_str(assurance_dict["troubleshooting_tools"], param_spec, "troubleshooting_tools", errormsg) + + network_analytics_list = role_config.get("network_analytics", []) + + if network_analytics_list: + for network_analytics_dect in network_analytics_list: + if network_analytics_dect.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(network_analytics_dect["overall"], param_spec, "overall", errormsg) + + if network_analytics_dect.get("data_access"): + param_spec = dict(type="str", length_max=255) + validate_str(network_analytics_dect["data_access"], param_spec, "data_access", errormsg) + + network_design_list = role_config.get("network_design", []) + + if network_design_list: + for network_design_dict in network_design_list: + if network_design_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["overall"], param_spec, "overall", errormsg) + + if network_design_dict.get("advanced_network_settings"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["advanced_network_settings"], param_spec, "advanced_network_settings", errormsg) + + if network_design_dict.get("image_repository"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["image_repository"], param_spec, "image_repository", errormsg) + + if network_design_dict.get("network_hierarchy"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["network_hierarchy"], param_spec, "network_hierarchy", errormsg) + + if network_design_dict.get("network_profiles"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["network_profiles"], param_spec, "network_profiles", errormsg) + + if network_design_dict.get("network_settings"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["network_settings"], param_spec, "network_settings", errormsg) + + if network_design_dict.get("virtual_network"): + param_spec = dict(type="str", length_max=255) + validate_str(network_design_dict["virtual_network"], param_spec, "virtual_network", errormsg) + + network_provision_list = role_config.get("network_provision", []) + + if network_provision_list: + for network_provision_dict in network_provision_list: + if network_provision_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["overall"], param_spec, "overall", errormsg) + + if network_provision_dict.get("compliance"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["compliance"], param_spec, "compliance", errormsg) + + if network_provision_dict.get("image_update"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["image_update"], param_spec, "image_update", errormsg) + + if network_provision_dict.get("inventory_management"): + inventory_management_list = network_provision_dict.get("inventory_management", []) + + for inventory_management_dict in inventory_management_list: + if inventory_management_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["overall"], param_spec, "overall", errormsg) + + if inventory_management_dict.get("device_configuration"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["device_configuration"], param_spec, "device_configuration", errormsg) + + if inventory_management_dict.get("discovery"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["discovery"], param_spec, "discovery", errormsg) + + if inventory_management_dict.get("network_device"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["network_device"], param_spec, "network_device", errormsg) + + if inventory_management_dict.get("port_management"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["port_management"], param_spec, "port_management", errormsg) + + if inventory_management_dict.get("topology"): + param_spec = dict(type="str", length_max=255) + validate_str(inventory_management_dict["topology"], param_spec, "topology", errormsg) + + if network_provision_dict.get("license"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["license"], param_spec, "license", errormsg) + + if network_provision_dict.get("network_telemetry"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["network_telemetry"], param_spec, "network_telemetry", errormsg) + + if network_provision_dict.get("pnp"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["pnp"], param_spec, "pnp", errormsg) + + if network_provision_dict.get("provision"): + param_spec = dict(type="str", length_max=255) + validate_str(network_provision_dict["provision"], param_spec, "provision", errormsg) + + network_services_list = role_config.get("network_services", []) + + if network_services_list: + for network_services_dict in network_services_list: + if network_services_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(network_services_dict["overall"], param_spec, "overall", errormsg) + + if network_services_dict.get("app_hosting"): + param_spec = dict(type="str", length_max=255) + validate_str(network_services_dict["app_hosting"], param_spec, "app_hosting", errormsg) + + if network_services_dict.get("bonjour"): + param_spec = dict(type="str", length_max=255) + validate_str(network_services_dict["bonjour"], param_spec, "bonjour", errormsg) + + if network_services_dict.get("stealthwatch"): + param_spec = dict(type="str", length_max=255) + validate_str(network_services_dict["stealthwatch"], param_spec, "stealthwatch", errormsg) + + if network_services_dict.get("umbrella"): + param_spec = dict(type="str", length_max=255) + validate_str(network_services_dict["umbrella"], param_spec, "umbrella", errormsg) + + platform_list = role_config.get("platform", []) + + if platform_list: + for platform_dict in platform_list: + if platform_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(platform_dict["overall"], param_spec, "overall", errormsg) + + if platform_dict.get("apis"): + param_spec = dict(type="str", length_max=255) + validate_str(platform_dict["apis"], param_spec, "apis", errormsg) + + if platform_dict.get("bundles"): + param_spec = dict(type="str", length_max=255) + validate_str(platform_dict["bundles"], param_spec, "bundles", errormsg) + + if platform_dict.get("events"): + param_spec = dict(type="str", length_max=255) + validate_str(platform_dict["events"], param_spec, "events", errormsg) + + if platform_dict.get("reports"): + param_spec = dict(type="str", length_max=255) + validate_str(platform_dict["reports"], param_spec, "reports", errormsg) + + security_list = role_config.get("security", []) + + if security_list: + for security_dict in security_list: + if security_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(security_dict["overall"], param_spec, "overall", errormsg) + + if security_dict.get("group_based_policy"): + param_spec = dict(type="str", length_max=255) + validate_str(security_dict["group_based_policy"], param_spec, "group_based_policy", errormsg) + + if security_dict.get("ip_based_access_control"): + param_spec = dict(type="str", length_max=255) + validate_str(security_dict["ip_based_access_control"], param_spec, "ip_based_access_control", errormsg) + + if security_dict.get("security_advisories"): + param_spec = dict(type="str", length_max=255) + validate_str(security_dict["security_advisories"], param_spec, "security_advisories", errormsg) + + system_list = role_config.get("system", []) + + if system_list: + for system_dict in system_list: + if system_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(system_dict["overall"], param_spec, "overall", errormsg) + + if system_dict.get("machine_reasoning"): + param_spec = dict(type="str", length_max=255) + validate_str(system_dict["machine_reasoning"], param_spec, "machine_reasoning", errormsg) + + if system_dict.get("system_management"): + param_spec = dict(type="str", length_max=255) + validate_str(system_dict["system_management"], param_spec, "system_management", errormsg) + + utilities_list = role_config.get("utilities", []) + + if utilities_list: + for utilities_dict in utilities_list: + if utilities_dict.get("overall"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["overall"], param_spec, "overall", errormsg) + + if utilities_dict.get("audit_log"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["audit_log"], param_spec, "audit_log", errormsg) + + if utilities_dict.get("event_viewer"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["event_viewer"], param_spec, "event_viewer", errormsg) + + if utilities_dict.get("network_reasoner"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["network_reasoner"], param_spec, "network_reasoner", errormsg) + + if utilities_dict.get("scheduler"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["scheduler"], param_spec, "scheduler", errormsg) + + if utilities_dict.get("search"): + param_spec = dict(type="str", length_max=255) + validate_str(utilities_dict["search"], param_spec, "search", errormsg) + + if len(errormsg) > 0: + self.msg = "Invalid parameters in playbook config: {0}".format(str("\n".join(errormsg))) + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + self.msg = "Successfully validated config params:{0}".format(str(role_config)) + self.log(self.msg, "INFO") + self.status = "success" + return self + + def valid_user_config_parameters(self, user_config): + """ + Addtional validation for the create user configuration payload. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - ap_config (dict): A dictionary containing the input configuration details. + Returns: + The method returns an instance of the class with updated attributes: + - self.msg: A message describing the validation result. + - self.status: The status of the validation (either "success" or "failed"). + Description: + - To use this method, create an instance of the class and call "valid_user_config_parameters" on it. + - If the validation succeeds it return "success". + - If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. + - To use this method, create an instance of the class and call "valid_user_config_parameters" on it. + - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. + """ + + errormsg = [] + + if user_config.get("first_name"): + first_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + if not first_name_regex.match(user_config["first_name"]): + errormsg.append("""first_name: first_name must only contain letters, numbers, underscores, and hyphens and + should not contain spaces or other special characters""") + + if user_config.get("last_name"): + last_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + if not last_name_regex.match(user_config["last_name"]): + errormsg.append("""last_name: last_name must only contain letters, numbers, underscores, and hyphens and + should not contain spaces or other special characters""") + + if user_config.get("email"): + email_regex = re.compile(r"[^@]+@[^@]+\.[^@]+") + if not email_regex.match(user_config["email"]): + errormsg.append("email: Invalid email format for email: {0}".format(user_config["email"])) + + if user_config.get("password"): + password_regex = re.compile(r"^(?=.*[A-Z])(?=.*[a-z])(?=.*\d)(?=.*[@$!%*?&])[A-Za-z\d@$!%*?&]{8,}$") + if not password_regex.match(user_config["password"]): + errormsg.append("password: Password does not meet complexity requirements for password: {0}".format(user_config["password"])) + + if user_config.get("username"): + username_regex = re.compile(r"^[A-Za-z0-9_-]+$") + if not username_regex.match(user_config["username"]): + errormsg.append("""username: Username must only contain letters, numbers, underscores, and hyphens and + should not contain spaces or other special characters""") + + if user_config.get("role_list"): + param_spec = dict(type="list", elements="str") + validate_list(user_config["role_list"], param_spec, "role_list", errormsg) + + if len(errormsg) > 0: + self.msg = "Invalid parameters in playbook config: {0}".format(str("\n".join(errormsg))) + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + self.msg = "Successfully validated config params:{0}".format(str(user_config)) + self.log(self.msg, "INFO") + self.status = "success" + return self + + def get_want(self, config): + """ + Retrieve all user or role-related information from the playbook needed for creation/updation in Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config (dict): A dictionary containing user or role information. + Returns: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Description: + - Retrieves all user or role-related information from the playbook required for creating or updating in Cisco Catalyst Center. + - Includes parameters such as "username", "email", "role_list" and "role_name" as applicable. + - Stores the gathered information in the "want" attribute for later reference. + - Logs the desired state configuration for debugging and informational purposes. + """ + + want = {} + for key, value in config.items(): + want[key] = value + + self.want = want + self.log("Desired State (want): {0}".format(str(self.want)), "INFO") + return self + + def get_have(self, input_config): + """ + Retrieve and store current user or role details from Cisco Catalyst Center based on input configuration. + Parameters: + - self (object): An instance for interacting with Cisco Catalyst Center. + - input_config (dict): Configuration details specifying user or role. + Returns: + - self (object): An instance for interacting with Cisco Catalyst Center. + Description: + - Queries Cisco Catalyst Center to check if specified user or role exists. + - If the input specifies a role name, checks and retrieves current role configuration. + - If the input specifies a username or email, checks and retrieves current user configuration. + - Stores retrieved user or role details in the "have" attribute for later reference. + """ + + user_exists = False + role_exists = False + current_user_config = None + current_role_config = None + current_role_id_config = None + have = {} + + if "role_name" in input_config and input_config["role_name"] is not None: + (role_exists, current_role_config) = self.get_current_config(input_config) + + if not role_exists: + self.log("The provided role {0} is not present in the Cisco Catalyst Center. Role_exists = \ + {1}".format(str(input_config.get("role_name")), str(role_exists)), "INFO") + + self.log("Current role config details (have): {0}".format(str(current_role_config)), "DEBUG") + + if role_exists: + have["role_name"] = current_role_config.get("name") + have["role_exists"] = role_exists + have["current_role_config"] = current_role_config + else: + have["role_exists"] = role_exists + + elif input_config["username"] is not None or input_config["email"] is not None: + (user_exists, role_exists, current_user_config, current_role_id_config) = self.get_current_config(input_config) + + if not user_exists: + self.log("The provided user {0} is not present in the Cisco Catalyst Center. User_exists = \ + {1}".format(str(input_config.get("username")), str(user_exists)), "INFO") + + self.log("Current user config details (have): {0}".format(str(current_user_config)), "DEBUG") + + if user_exists: + have["username"] = current_user_config.get("username") + have["user_exists"] = user_exists + have["current_user_config"] = current_user_config + have["current_role_id_config"] = current_role_id_config + else: + have["user_exists"] = user_exists + have["current_role_id_config"] = current_role_id_config + + if role_exists: + have["current_role_id_config"] = current_role_id_config + + self.have = have + self.log("Current State (have): {0}".format(str(self.have)), "INFO") + return self + + def get_diff_merged(self, config): + """ + Update or create users and roles in Cisco Catalyst Center based on playbook configurations. + Parameters: + - self (object): Instance for interacting with Cisco Catalyst Center. + - config (dict): Configuration data for user or role updates. + Returns: + - self (object): Instance for interacting with Cisco Catalyst Center. + Description: + - Determines whether to update or create a user or role in Cisco Catalyst Center based on the provided configuration. + - Determines update or creation needs based on "role_name", "username", or "email" in config. + - Updates roles if "role_name" exists, creates if absent using "create_role" or "update_role". + - Updates users if "username" or "email" exists, creates if absent using "create_user" or "update_user". + - Returns the instance of the class used for interacting with Cisco Catalyst Center after updating or + creating the user or role. + """ + + config_updated = False + config_created = False + task_response = None + responses = {} + # check if the given user or role config exists and decided on updated/created operation need to be done. + + if "role_name" in config and config["role_name"] is not None: + + if self.have.get("role_exists"): + # update the role + self.valid_role_config_parameters(config).check_return_status() + desired_role = self.generate_role_payload(self.want, "update") + self.log("desired role with config {0}".format(str(desired_role)), "INFO") + if "error" not in desired_role: + consolidated_data, update_required_param = self.role_requires_update(self.have["current_role_config"], desired_role) + if not consolidated_data: + # role does not need update + self.msg = "Role does not need any update" + self.log(self.msg, "INFO") + responses["role_operation"] = {"response": config} + self.result["response"] = self.msg + self.status = "success" + return self + + task_response = self.update_role(update_required_param) + else: + task_response = desired_role + + else: + # Create the role + self.valid_role_config_parameters(config).check_return_status() + self.log("Creating role with config {0}".format(str(config)), "INFO") + role_info_params = self.generate_role_payload(self.want, "create") + if "error" not in role_info_params: + filtered_data, overall_update_required = self.get_permissions(self.want, role_info_params, "create") + denied_permissions = self.find_denied_permissions(self.want) + denied_required, create_role_params = self.remove_denied_operations(filtered_data, denied_permissions) + if denied_required or overall_update_required: + task_response = self.create_role(create_role_params) + else: + task_response = self.create_role(role_info_params) + else: + task_response = role_info_params + + elif config["username"] is not None or config["email"] is not None: + if self.have.get("user_exists"): + # update the user + self.valid_user_config_parameters(config).check_return_status() + (consolidated_data, update_required_param) = self.user_requires_update(self.have["current_user_config"], self.have["current_role_id_config"]) + self.log(update_required_param) + if not consolidated_data: + # user does not need update + self.msg = "User does not need any update" + self.log(self.msg, "INFO") + responses["role_operation"] = {"response": config} + self.result["response"] = self.msg + self.status = "success" + return self + + if update_required_param.get("role_list"): + user_in_have = self.have["current_user_config"] + update_param = update_required_param + update_param["username"] = user_in_have.get("username") + update_param["user_id"] = user_in_have.get("user_id") + user_info_params = self.snake_to_camel_case(update_param) + task_response = self.update_user(user_info_params) + else: + task_response = {"error": "Role name is not present in the Cisco Catalyst Center: Please provide a valid role name"} + else: + # Create the user + self.valid_user_config_parameters(config).check_return_status() + self.log("Creating user with config {0}".format(str(config)), "INFO") + user_params = self.want + + user_details = {} + for key, value in user_params.items(): + if value is not None: + if key != "role_list": + user_details[key] = value + else: + current_role = self.have.get("current_role_id_config") + user_details[key] = [] + for role_name in user_params["role_list"]: + role_id = current_role.get(role_name.lower()) + if role_id: + user_details[key].append(role_id) + else: + self.log("Role ID for {0} not found in current_role_id_config".format(str(role_name))) + + if "role_list" not in user_details: + user_details["role_list"] = ["6486ce98ff1f0d0c8be622fb"] + + if user_details.get("role_list"): + user_info_params = self.snake_to_camel_case(user_details) + task_response = self.create_user(user_info_params) + else: + task_response = {"error": "Role name is not present in the Cisco Catalyst Center: Please provide a valid role name"} + + if "error" in task_response: + config_created = False + else: + config_created = True + + if config_updated: + self.log("Task response {0}".format(str(task_response)), "INFO") + responses["users_operation"] = {"response": task_response} + self.msg = responses + self.result["response"] = self.msg + self.status = "success" + self.log(self.msg, "INFO") + return self + + if config_created: + self.log("Task respoonse {0}".format(str(task_response)), "INFO") + responses["users_operation"] = {"response": task_response} + self.msg = responses + self.result["response"] = self.msg + self.status = "success" + self.log(self.msg, "INFO") + return self + + self.msg = "Task response: {0}".format(str(task_response.get("error"))) + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + def get_current_config(self, input_config): + """ + Retrieve user and role details from Cisco Catalyst Center based on input parameters. + + Parameters: + - self (object): An instance of the class used for interacting with Cisco Catalyst Center. + - input_config (dict): A dictionary containing input parameters for retrieving user or role details. + + Returns: + - user containing: + - user_exists (bool): True if the user exists, False otherwise. + - current_user_configuration (dict): Dictionary containing current user details. + - current_role_id (dict): Dictionary containing current role IDs. + - role_exists (bool): True if the role exists, False otherwise. + - role containing: + - role_exists (bool): True if the role exists, False otherwise. + - current_role_configuration (dict): Dictionary containing current role details. + + Description: + - Checks the existence of a user and retrieves user details in Cisco Catalyst Center + by querying the "get_users_ap_i" function in the "user_and_roles" family. + - Checks the existence of a role and retrieves role details in Cisco Catalyst Center + by querying the "get_roles_ap_i" function in the "user_and_roles" family. + - Logs errors if required parameters are missing in the playbook config. + """ + + user_exists = False + role_exists = False + current_user_configuration = {} + current_role_configuration = {} + current_role_id = {} + response_user = None + response_role = None + + response_user = self.get_user() + + response_role = self.get_role() + + if response_user and response_role: + response_user = self.camel_to_snake_case(response_user) + response_role = self.camel_to_snake_case(response_role) + + users = response_user.get("response", {0}).get("users", []) + roles = response_role.get("response", {0}).get("roles", []) + + if "role_name" in input_config and input_config["role_name"] is not None: + for role in roles: + if role.get("name") == input_config.get("role_name"): + current_role_configuration = role + role_exists = True + + return role_exists, current_role_configuration + + elif input_config["username"] is not None or input_config["email"] is not None: + for user in users: + if user.get("username") == input_config.get("username"): + current_user_configuration = user + user_exists = True + elif input_config.get("email") is not None: + if user.get("email") == input_config.get("email"): + current_user_configuration = user + user_exists = True + + if input_config.get("role_list") is not None and input_config.get("role_list"): + for role in roles: + if role.get("name").lower() == input_config.get("role_list")[0].lower(): + current_role_id[role.get("name").lower()] = role.get("role_id") + role_exists = True + return user_exists, role_exists, current_user_configuration, current_role_id + + def create_user(self, user_params): + """ + Create a new user in Cisco Catalyst Center with the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - user_params (dict): A dictionary containing user information. + Returns: + - response (dict): The API response from the "create_user" function. + Description: + - Sends a request to create a new user in Cisco Catalyst Center using the provided user parameters. + - Uses the "user_and_roles" family and "add_user_ap_i" function for the API call. + - Logs the provided user parameters and the received API response. + - Returns the API response from the "create_user" function. + """ + + try: + self.log("Create user with user_info_params: {0}".format(str(user_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="add_user_ap_i", + op_modifies=True, + params=user_params, + ) + self.log("Received API response from create_user: {0}".format(str(response)), "DEBUG") + return response + + except Exception as e: + error_message = "Mandatory field not present: An error occurred while creating the user: {0}".format(str(e)) + return {"error": error_message} + + def create_role(self, role_params): + """ + Create a new role in Cisco Catalyst Center with the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_params (dict): A dictionary containing role information. + Returns: + - response (dict): The API response from the "create_role" function. + Description: + - Sends a request to create a new role in Cisco Catalyst Center using the provided role parameters. + - Utilizes the "user_and_roles" family and "add_role_ap_i" function for the API request. + - Logs the provided role parameters and the received API response. + - Returns the API response from the "create_role" function. + """ + + try: + self.log("Create role with role_info_params: {0}".format(str(role_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="add_role_ap_i", + op_modifies=True, + params=role_params, + ) + self.log("Received API response from create_role: {0}".format(str(response)), "DEBUG") + return response + + except Exception as e: + error_message = "An error occurred while creating the role without access-level parameters and permissions: {0}".format(str(e)) + return {"error": error_message} + + def get_user(self): + """ + Retrieve users from Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Returns: + - response (dict): The API response from the "get_users_api" function. + Description: + - Sends a request to retrieve users from Cisco Catalyst Center using the "user_and_roles" family + and "get_users_ap_i" function. + - Logs the received API response and returns it. + """ + + response = self.dnac._exec( + family="user_and_roles", + function="get_users_ap_i", + op_modifies=True, + params={"invoke_source": "external"}, + ) + self.log("Received API response from get_users_api: {0}".format(str(response)), "DEBUG") + return response + + def get_role(self): + """ + Retrieve roles from Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Returns: + - response (dict): The API response from the "get_roles" function. + Description: + - Sends a request to retrieve roles from Cisco Catalyst Center using the "user_and_roles" family + and "get_roles_ap_i" function. + - Logs the received API response and returns it. + """ + + response = self.dnac._exec( + family="user_and_roles", + function="get_roles_ap_i", + op_modifies=True, + ) + self.log("Received API response from get_roles_api: {0}".format(str(response)), "DEBUG") + return response + + def generate_role_payload(self, role_config, role_operation): + """ + Generate a role payload for Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_config (dict): A dictionary containing the configuration for the role. + Returns: + - payload (dict): A dictionary containing the payload for the role with processed resource types and operations. + Description: + - Generates a payload for a role based on the given role configuration. + - Processes various sections of the role configuration, such as assurance, network analytics, + network design, network provision, network services, platform, security, system, and utilities. + - Validates permissions and converts them to corresponding operations using the convert_permission_to_operations method. + - If the permission is valid and not set to "deny", constructs a resource type entry with operations and appends it to resource_types. + - The final payload includes the role name, description, and the list of resource types with operations. + """ + + if not role_config: + return None + + role_name = role_config.get("role_name", "") + description = role_config.get("description", "") + + resource_types = [] + unique_types = {} + + # Process assurance rules + if "assurance" in role_config and role_config.get("assurance") is not None: + if role_operation != "update": + default_entries = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + for assurance in role_config["assurance"]: + for resource, permission in assurance.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for assurance resource {1}".format(permission, resource)} + + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "monitoring_and_troubleshooting": + new_entry = { + "type": "Assurance.Monitoring and Troubleshooting", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Assurance.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process network analytics rules + if "network_analytics" in role_config and role_config.get("network_analytics") is not None: + if role_operation != "update": + new_entry = { + "type": "Network Analytics.Data Access", + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for network_analytics in role_config["network_analytics"]: + for resource, permission in network_analytics.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for network analytics resource {1}".format(permission, resource)} + + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entry = { + "type": "Network Analytics.Data Access", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Network Analytics.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + new_entry = { + "type": "Network Analytics.Data Access", + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process network design rules + if "network_design" in role_config and role_config.get("network_design") is not None: + if role_operation != "update": + default_entries = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for network_design in role_config["network_design"]: + for resource, permission in network_design.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for network design resource {1}".format(permission, resource)} + + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Network Design.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process network provision rules + if "network_provision" in role_config and role_config.get("network_provision") is not None: + if role_operation != "update": + default_entries = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + if not isinstance(role_config["network_provision"], list): + return {"error": "The given network_provision is not in type: list"} + + for provision in role_config["network_provision"]: + for resource, permission in provision.items(): + if isinstance(permission, list): + # Handle nested inventory_management + for sub_resource, sub_permission in permission[0].items(): + if sub_permission is None: + continue + else: + sub_permission = sub_permission.lower() + + if sub_permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for sub-resource {1}".format(str(sub_permission), str(sub_resource))} + if sub_permission != "deny" and sub_permission is not None: + operations = self.convert_permission_to_operations(sub_permission) + + if sub_resource == "overall": + new_entries = [ + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Network Provision.{0}.{1}".format(resource.replace("_", " ").title(), sub_resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for resource {1}".format(str(permission), str(resource))} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "eox": + new_entry = { + "type": "Network Provision.EoX", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "pnp": + new_entry = { + "type": "Network Provision.PnP", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Network Provision.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process network services rules + if "network_services" in role_config and role_config.get("network_services") is not None: + if role_operation != "update": + default_entries = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for services in role_config["network_services"]: + for resource, permission in services.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for network services resource {1}".format(permission, resource)} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Network Services.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process platform rules + if "platform" in role_config and role_config.get("platform") is not None: + for platform in role_config["platform"]: + for resource, permission in platform.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for platform resource {1}".format(permission, resource)} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + if resource == "overall": + new_entries = [ + "Platform.APIs", + "Platform.Bundles", + "Platform.Events", + "Platform.Reports" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "apis": + new_entry = { + "type": "Platform.APIs", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Platform.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process security rules + if "security" in role_config and role_config.get("security") is not None: + if role_operation != "update": + default_entries = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for security in role_config["security"]: + for resource, permission in security.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for security resource {1}".format(permission, resource)} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "ip_based_access_control": + new_entry = { + "type": "Security.IP Based Access Control", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + elif resource == "group_based_policy": + new_entry = { + "type": "Security.Group-Based Policy", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Security.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process system rules + if "system" in role_config and role_config.get("system") is not None: + if role_operation != "update": + default_entries = [ + "System.Machine Reasoning", + "System.System Management" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for system in role_config["system"]: + for resource, permission in system.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for system resource {1}".format(permission, resource)} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "System.Machine Reasoning", + "System.System Management" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "System.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "System.Machine Reasoning", + "System.System Management" + ] + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Process utilities rules + if "utilities" in role_config and role_config.get("utilities") is not None: + if role_operation != "update": + default_entries = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search" + ] + new_entry1 = { + "type": "Utilities.Scheduler", + "operations": ["gRead", "gUpdate", "gCreate", "gRemove"] + } + unique_types[new_entry1["type"]] = new_entry1 + + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + for utilities in role_config["utilities"]: + for resource, permission in utilities.items(): + if permission is None: + continue + else: + permission = permission.lower() + + if permission not in ["read", "write", "deny", None]: + return {"error": "Invalid permission {0} for utilities resource {1}".format(permission, resource)} + if permission != "deny" and permission is not None: + operations = self.convert_permission_to_operations(permission) + + if resource == "overall": + new_entries = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search", + "Utilities.Audit Log", + "Utilities.Remote Device Support", + "Utilities.Scheduler" + ] + for entry in new_entries: + new_entry = { + "type": entry, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + else: + new_entry = { + "type": "Utilities.{0}".format(resource.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + else: + if role_operation != "update": + default_entries = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search" + ] + new_entry1 = { + "type": "Utilities.Scheduler", + "operations": ["gRead", "gUpdate", "gCreate", "gRemove"] + } + unique_types[new_entry1["type"]] = new_entry1 + + for entry in default_entries: + new_entry = { + "type": entry, + "operations": ["gRead"] + } + unique_types[new_entry["type"]] = new_entry + + resource_types = list(unique_types.values()) + + # Construct the final payload + payload = { + "role": role_name, + "description": description, + "resourceTypes": resource_types + } + + return payload + + def convert_permission_to_operations(self, permission): + """ + Convert a permission string to a list of operations. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - permission (str): A string representing the permission level (e.g., "read" or "write"). + Returns: + - list: A list of strings representing operations associated with the given permission level. + Returns None if the permission level is not recognized. + Description: + - This method converts a permission string to a corresponding list of operations. + - For "read" or "Read" permissions, it returns a list containing "gRead". + - For "write" or "Write" permissions, it returns a list containing "gRead", "gUpdate", "gCreate", and "gRemove". + - If the permission level is not recognized, it returns None. + """ + + if permission == "read": + return ["gRead"] + elif permission == "write": + return ["gRead", "gUpdate", "gCreate", "gRemove"] + else: + return None + + def role_requires_update(self, current_role, desired_role): + """ + Check if the role requires updates and save parameters to update. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - current_role (dict): Dictionary containing current role information. + - desired_role (dict): Dictionary containing desired role information. + Returns: + - bool: True if the role requires updates, False otherwise. + - updated_get_have (dict): Updated dictionary with parameters that need to be updated. + Description: + - This method checks if the current role information needs to be updated based on the desired role information. + - It compares the resource types and operations between current_role and desired_role. + - If any resource type is not found in current_role but exists in desired_role, it adds it to current_role. + - Removes denied operations based on denied permissions found in self.want. + - Returns values indicating whether updates are required and the updated role information. + """ + + update_required = False + + for want_resource in desired_role["resourceTypes"]: + found = False + for have_resource in current_role["resource_types"]: + if have_resource["type"] == want_resource["type"]: + found = True + if have_resource["operations"] != want_resource["operations"]: + have_resource["operations"] = want_resource["operations"] + update_required = True + break + if not found: + current_role["resource_types"].append(want_resource) + update_required = True + + update_role_param = {} + if desired_role.get("description") is not None: + if current_role.get("description") != desired_role.get("description"): + update_role_param["description"] = desired_role["description"] + update_required = True + elif "description" not in update_role_param: + update_role_param["description"] = current_role["description"] + else: + update_role_param["description"] = current_role["description"] + + # Create the updated dictionary + updated_get_have = { + "roleId": current_role["role_id"], + "description": update_role_param["description"], + "resourceTypes": current_role["resource_types"] + } + + filtered_data, overall_update_required = self.get_permissions(self.want, updated_get_have, "update") + + denied_permissions = self.find_denied_permissions(self.want) + denied_update_required, updated_get_have = self.remove_denied_operations(filtered_data, denied_permissions) + + if update_required or denied_update_required or overall_update_required: + role_update_required = True + return role_update_required, updated_get_have + else: + role_update_required = False + return role_update_required, updated_get_have + + def user_requires_update(self, current_user, current_role): + """ + Check if the user requires updates and save parameters to update. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - current_user (dict): Dictionary containing current user information. + - current_role (dict): Dictionary containing role mappings. + Returns: + - bool: True if the user requires updates, False otherwise. + - update_user_param (dict): Dictionary containing parameters that need to be updated. + Description: + - This method checks if the current user information needs to be updated based on the desired user information. + - It compares specific fields such as "first_name", "last_name", "email", "username", and "role_list". + - If any of these fields differ between current_user and self.want, update_user_param is populated with the desired values. + - Returns values indicating whether updates are required and the parameters to update if so. + """ + + update_required = False + update_user_param = {} + + if self.want.get("first_name") is not None: + if current_user.get("first_name") != self.want.get("first_name"): + update_user_param["first_name"] = self.want["first_name"] + update_required = True + elif "first_name" not in update_user_param: + update_user_param["first_name"] = current_user["first_name"] + else: + update_user_param["first_name"] = current_user["first_name"] + + if self.want.get("last_name") is not None: + if current_user.get("last_name") != self.want.get("last_name"): + update_user_param["last_name"] = self.want["last_name"] + update_required = True + elif "last_name" not in update_user_param: + update_user_param["last_name"] = current_user["last_name"] + else: + update_user_param["last_name"] = current_user["last_name"] + + if self.want.get("email") is not None: + if current_user.get("email") != self.want.get("email"): + update_user_param["email"] = self.want["email"] + update_required = True + elif "email" not in update_user_param: + update_user_param["email"] = current_user["email"] + else: + update_user_param["email"] = current_user["email"] + + if self.want.get("role_list") is not None: + role_name = self.want.get("role_list")[0].lower() + if role_name in current_role: + role_id = current_role[role_name] + if current_user.get("role_list")[0] != role_id: + update_user_param["role_list"] = [role_id] + update_required = True + else: + update_user_param["role_list"] = current_user["role_list"] + else: + update_user_param["role_list"] = [] + update_required = True + else: + update_user_param["role_list"] = current_user["role_list"] + + return update_required, update_user_param + + def update_user(self, user_params): + """ + Update a user in Cisco Catalyst Center with the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - user_params (dict): A dictionary containing user information. + Returns: + - response (dict): The API response from the "update_user" function. + Description: + - This method sends a request to update a user in Cisco Catalyst Center using the provided + - user parameters. It logs the response and returns it. + """ + + try: + self.log("Update user with user_info_params: {0}".format(str(user_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="update_user_ap_i", + op_modifies=True, + params=user_params, + ) + self.log("Received API response from update_user: {0}".format(str(response)), "DEBUG") + return response + + except Exception as e: + error_message = "Mandatory field not present: An error occurred while updating the user: {0}".format(str(e)) + return {"error": error_message} + + def update_role(self, role_params): + """ + Update a role in Cisco Catalyst Center with the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_params (dict): A dictionary containing role information. + Returns: + - response (dict): The API response from the "update_role" function. + Description: + - This method sends a request to update a role in Cisco Catalyst Center using the provided + role parameters. It first logs the role parameters at the "DEBUG" level. Then it calls the"_exec" method + of the "dnac" object to perform the API request. The API request is specified with the "user_and_roles" family + and the "update_role_ap_i" function. The method logs the received API response at the "DEBUG" level and + finally returns the response. + """ + + self.log("Update role with role_info_params: {0}".format(str(role_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="update_role_ap_i", + op_modifies=True, + params=role_params, + ) + self.log("Received API response from update_role: {0}".format(str(response)), "DEBUG") + + return response + + def find_denied_permissions(self, config, parent_key=""): + """ + Find all permissions set to "deny" in a configuration structure. + Parameters: + - config (dict or list): The configuration structure to search, which can be a nested dictionary or list. + - parent_key (str): The key path leading to the current position in the configuration (used for nested structures). + Returns: + - denied_permissions (list): A list of keys representing paths in the configuration that have "deny" as their value. + Description: + - This function recursively searches through a given configuration structure, which can be a dictionary or a list, + to find all occurrences of the string "deny". It constructs and returns a list of key paths where "deny" is found. + The key paths are formed by combining parent keys with the current keys or indices, providing a clear path + to the denied permissions within the nested structure. + """ + + denied_permissions = [] + + if isinstance(config, dict): + for key, value in config.items(): + if parent_key: + full_key = "{0}.{1}".format(parent_key, key) + else: + full_key = key + + if isinstance(value, dict) or isinstance(value, list): + denied_permissions.extend(self.find_denied_permissions(value, full_key)) + elif isinstance(value, str) and value.lower() == "deny": + denied_permissions.append(full_key) + + elif isinstance(config, list): + for index, item in enumerate(config): + full_key = "{0}[{1}]".format(parent_key, index) + + if isinstance(item, dict): + denied_permissions.extend(self.find_denied_permissions(item, full_key)) + elif isinstance(item, str) and item.lower() == "deny": + denied_permissions.append(full_key) + + return denied_permissions + + def remove_denied_operations(self, input_data, denied_permissions): + """ + Remove denied operations from the input data based on the provided denied permissions. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - input_data (dict): Input data containing resource types that may include denied operations. + - denied_permissions (list): A list of denied permissions to be removed from input_data. + Returns: + - update_required (bool): True if any denied operations were removed, otherwise False. + - updated_input_data (dict): Input data with denied operations removed. + Description: + - This method filters out denied operations from the resource types in the input_data based on the provided denied_permissions. + - It checks each resource type against the denied permissions to determine if it should be kept or removed. + - If a resource type matches any of the denied permissions, it is excluded from the updated input_data. + - The method returns values indicating whether any updates were made (update_required) and the updated input_data. + """ + + resource_types = input_data["resourceTypes"] + remaining_resource_types = [] + update_required = False + + for resource in resource_types: + keep_resource = True + resource_type_lower = resource["type"].lower() + for denied in denied_permissions: + denied_type_lower = denied.split(".")[-1].replace("_", " ").replace("[0]", "").lower() + + if denied_type_lower == "network settings": + denied_type_lower = "network design.network settings" + if denied_type_lower in resource_type_lower: + keep_resource = False + update_required = True + break + + elif denied_type_lower == "provision": + denied_type_lower = "network provision.provision" + if denied_type_lower in resource_type_lower: + keep_resource = False + update_required = True + break + + elif denied_type_lower == "group based policy": + denied_type_lower = "security.group-based policy" + if denied_type_lower in resource_type_lower: + keep_resource = False + update_required = True + break + + else: + if denied_type_lower in resource_type_lower: + keep_resource = False + update_required = True + break + + if keep_resource: + remaining_resource_types.append(resource) + + input_data["resourceTypes"] = remaining_resource_types + return update_required, input_data + + def parse_config(self, config_section): + """ + Parse the given configuration section into a structured dictionary. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config_section (dict): A dictionary containing a section of the configuration to be parsed. + Returns: + - parsed_config (dict): A dictionary containing the parsed configuration details. + Description: + - This method iterates through the provided configuration section and processes each key-value pair. + - If the value is None, it assigns an empty dictionary to the corresponding key in the parsed configuration. + - If the value is a non-empty list, it recursively parses the first element of the list. + - Otherwise, it directly assigns the value to the corresponding key in the parsed configuration. + - The resulting dictionary represents the structured configuration details. + """ + + parsed_config = {} + for key, value in config_section.items(): + if value is None: + parsed_config[key] = {} + elif isinstance(value, list) and value: + parsed_config[key] = self.parse_config(value[0]) + else: + parsed_config[key] = value + return parsed_config + + def check_permission(self, permissions, resource_type): + """ + Check if a given resource type has permissions denied or allowed based on the provided permissions. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - permissions (dict): A dictionary containing permission details for various resource types. + - resource_type (str): A string specifying the resource type for which permissions are being checked. + Returns: + - check_deny_update (bool): A boolean indicating if the overall permission is denied. + - check_permission (bool): A boolean indicating if the permission is allowed. + Description: + - This method processes the resource type string to generate a list of keys for navigating through the permissions dictionary. + - It traverses the permissions dictionary based on the generated keys to find the relevant permission level. + - If an "overall" permission of "deny" is found at any level, it returns (True, False). + - If the keys do not match any entry in the permissions dictionary, it returns (False, True). + - If the keys match and there is no "overall" permission of "deny", it returns (False, True). + """ + + keys = resource_type.lower().replace(" ", "_").split(".") + current_level = permissions + for key in keys: + if key in current_level: + current_level = current_level[key] + elif "overall" in current_level and current_level["overall"].lower() == "deny": + return True, False + else: + return False, True + + return False, "overall" not in current_level or current_level["overall"].lower() != "deny" + + def get_operations(self, permissions, resource_type): + """ + Retrieve specific operations allowed for a given resource type based on the provided permissions. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - permissions (dict): A dictionary containing permission details for various resource types. + - resource_type (str): A string specifying the resource type for which operations are being retrieved. + Returns: + - list: A list of specific operations allowed for the given resource type. If no specific operations are found, an empty list is returned. + Description: + - This method processes the resource type string to generate a list of keys for navigating through the permissions dictionary. + - It traverses the permissions dictionary based on the generated keys to find the relevant permission level. + - If an "overall" permission of "deny" is found, it collects and returns specific permissions that are not denied. + - If no specific operations are found or if the "overall" permission is not "deny", it returns an empty list. + """ + + keys = resource_type.lower().replace(" ", "_").split(".") + current_level = permissions + + for key in keys: + if key in current_level: + current_level = current_level[key] + + if "overall" in current_level and current_level["overall"].lower() == "deny": + specific_permissions = {} + for k, v in current_level.items(): + if k != "overall" and v.lower() != "deny": + specific_permissions[k] = v + + return list(specific_permissions.values()) + + return [] + + def get_permissions(self, config, input_data, role_operation): + """ + Retrieve and configure permissions for a role based on the provided configuration and input data. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config (dict): A dictionary containing configuration details. + - input_data (dict): A dictionary containing the role details, including "role", "description", and "resourceTypes". + - role_operation (str): A string indicating the operation type (e.g., "update"). + Returns: + - result (dict): A dictionary containing the configured role permissions. + - is_denied (bool): A boolean indicating if any operation is denied. + Description: + - This method parses the provided configuration to retrieve permissions for the specified resources in the input data. + It checks permissions for each resource type and determines the allowed operations. + - If the role_operation is not "update", it includes the role name in the result. Otherwise, it includes the role ID. + - It logs the final permissions configuration and returns the result along with a boolean indicating if any operations + are denied. + """ + + permissions = self.parse_config(config) + allowed_operations = [] + check_deny = [] + + for resource in input_data["resourceTypes"]: + res_type = resource["type"] + operations = resource["operations"] + + check_deny_update, check_permission = self.check_permission(permissions, res_type) + check_deny.append(str(check_deny_update)) + + if check_permission: + specific_operations = self.get_operations(permissions, res_type) + allowed_operations.append({ + "type": res_type, + "operations": operations if not specific_operations else specific_operations + }) + + if role_operation != "update": + result = { + "role": input_data["role"], + "description": input_data["description"], + "resourceTypes": allowed_operations + } + else: + result = { + "roleId": input_data["roleId"], + "description": input_data["description"], + "resourceTypes": allowed_operations + } + + if "True" in check_deny: + return result, True + else: + return result, False + + def get_diff_deleted(self, config): + """ + Delete a user or role from Cisco Catalyst Center based on the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config (dict): A dictionary containing configuration details, such as "role_name", "username", and "email". + Returns: + - self (object): An instance of the class after the deletion operation is performed. + Description: + - This method checks the provided configuration to determine whether a role or user needs to be deleted from + Cisco Catalyst Center. It verifies if the role or user exists, logs the current state, and then proceeds to delete + the specified role or user. It logs the response from the deletion operation and updates the status and result + accordingly. + """ + + config_delete = False + + if "role_name" in config and config["role_name"] is not None: + + if self.have.get("role_exists"): + self.valid_role_config_parameters(config).check_return_status() + self.log("Deleting role with config {0}".format(str(config)), "INFO") + + # Check if the role exists in self.have + current_role = self.have.get("current_role_config") + role_id_to_delete = {} + role_id_to_delete["role_id"] = current_role.get("role_id") + task_response = self.delete_role(role_id_to_delete) + self.log("Task response {0}".format(str(task_response)), "INFO") + if "error" in task_response: + config_delete = False + else: + config_delete = True + + if config_delete: + responses = {} + responses["role_operation"] = {"response": task_response} + self.msg = responses + self.result["response"] = self.msg + self.status = "success" + self.log(self.msg, "INFO") + return self + else: + self.msg = task_response + self.log(self.msg, "ERROR") + self.status = "failed" + return self + else: + self.msg = "Please provide a valid role_name for role deletion" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + elif config["username"] is not None or config["email"] is not None: + + if self.have.get("user_exists"): + self.valid_user_config_parameters(config).check_return_status() + self.log("Deleting user with config {0}".format(str(config)), "INFO") + + # Check if the username exists in self.have + current_user = self.have.get("current_user_config") + user_id_to_delete = {} + user_id_to_delete["user_id"] = current_user.get("user_id") + task_response = self.delete_user(user_id_to_delete) + self.log("Task response {0}".format(str(task_response)), "INFO") + config_delete = True + + if config_delete: + responses = {} + responses["users_operation"] = {"response": task_response} + self.msg = responses + self.result["response"] = self.msg + self.status = "success" + self.log(self.msg, "INFO") + return self + + else: + self.msg = "Please provide a valid username or email for user deletion" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + + def delete_user(self, user_params): + """ + Delete a user in Cisco Catalyst Center with the provided parameters. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - user_params (dict): A dictionary containing user information. + Returns: + - response (dict): The API response from the "delete_user" function. + Description: + - This method sends a request to delete a user in Cisco Catalyst Center using the provided user parameters. + - It logs the response and returns it. + - The function uses the "user_and_roles" family and the "delete_user_ap_i" function from the Cisco Catalyst Center API. + """ + + self.log("delete user with user_params: {0}".format(str(user_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="delete_user_ap_i", + op_modifies=True, + params=user_params, + ) + self.log("Received API response from delete_user: {0}".format(str(response)), "DEBUG") + return response + + def delete_role(self, role_params): + """ + Delete a role in Cisco Catalyst Center with the provided parameters + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_params (dict): A dictionary containing role information. + Returns: + - response (dict): The API response from the "delete_role" function. + Description: + - This method sends a request to delete a role in Cisco Catalyst Center using the provided role parameters. + - It logs the response and returns it. + - The function uses the "user_and_roles" family and the "delete_role_ap_i" function from the Cisco Catalyst Center API. + """ + + try: + self.log("delete role with role_params: {0}".format(str(role_params)), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="delete_role_ap_i", + op_modifies=True, + params=role_params, + ) + self.log("Received API response from delete_role: {0}".format(str(response)), "DEBUG") + except Exception: + error_message = "An error occurred while deleting the role. Check whether user are assigned to this role: \ + {0}".format(str(self.have.get("role_name"))) + + return {"error": error_message} + + return response + + def verify_diff_merged(self, config): + """ + Verify the merged status (Creation/Updation) of user or role details in Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config (dict): The configuration details to be verified, containing keys like "role_name", "username", and "email". + Returns: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Description: + - This method checks the merged status of a user or role configuration in Cisco Catalyst Center by retrieving the current state + (have) and desired state (want) of the configuration. It logs the current and desired states, and validates whether the specified + user or role exists in the Catalyst Center configuration. + - The method verifies if the role or user creation or update has been executed successfully by comparing the current state with + the desired state and checking if any updates are required. + - If the specified role or user exists, it logs a success message. If the role or user needs to be updated, it checks if the update + has been successfully verified. In case of any mismatch between the playbook input and the Catalyst Center configuration, it logs + an appropriate message indicating that the merge task may not have executed successfully. + """ + + if "role_name" in config and config["role_name"] is not None: + self.get_have(config) + self.log("Current State (have): {0}".format(str(self.have)), "INFO") + self.log("Desired State (want): {0}".format(str(self.want)), "INFO") + + # Code to validate ccc config for merged state + role_exist = self.have.get("role_exists") + role_name = self.want.get("role_name") + + if role_exist: + self.status = "success" + self.msg = "The requested role {0} is present in the Cisco Catalyst Center and its creation has been verified.".format(role_name) + self.log(self.msg, "INFO") + + desired_role = self.generate_role_payload(self.want, "update") + (require_update, updated_role_info) = self.role_requires_update(self.have["current_role_config"], desired_role) + if not require_update: + self.log("The update for role {0} has been successfully verified. The updated info - {1}".format(role_name, updated_role_info), "INFO") + self. status = "success" + + if not role_exist: + self.log("""The playbook input for role {0} does not align with the Cisco Catalyst Center, indicating that the \ + merge task may not have executed successfully.""".format(role_name), "INFO") + + elif config["username"] is not None or config["email"] is not None: + self.get_have(config) + self.log("Current State (have): {0}".format(str(self.have)), "INFO") + self.log("Desired State (want): {0}".format(str(self.want)), "INFO") + + # Code to validate ccc config for merged state + user_exist = self.have.get("user_exists") + user_name = self.have.get("username") + + if user_exist: + self.status = "success" + self.msg = "The requested user {0} is present in the Cisco Catalyst Center and its creation has been verified.".format(user_name) + self.log(self.msg, "INFO") + + (require_update, updated_user_info) = self.user_requires_update(self.have["current_user_config"], self.have["current_role_id_config"]) + if not require_update: + self.log("The update for user {0} has been successfully verified. The updated info - {1}".format(user_name, updated_user_info), "INFO") + self. status = "success" + + if not user_exist: + self.log("""The playbook input for user {0} does not align with the Cisco Catalyst Center, indicating that \ + the merge task may not have executed successfully.""".format(user_name), "INFO") + + return self + + def verify_diff_deleted(self, config): + """ + Verify the deletion status of user or role details in Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - config (dict): The configuration details to be verified, containing keys like "role_name", "username", and "email". + Returns: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Description: + - This method checks the deletion status of a user or role configuration in Cisco Catalyst Center. + - It validates whether the specified site (user or role) exists in the Catalyst Center configuration. + - If the specified role or user does not exist, it sets the status to "success" and logs a confirmation message. + - If the role or user still exists, it logs a mismatch message indicating the deletion was not executed successfully. + """ + + if "role_name" in config and config["role_name"] is not None: + self.get_have(config) + self.log("Current State (have): {0}".format(str(self.have)), "INFO") + self.log("Desired State (want): {0}".format(str(self.want)), "INFO") + + role_exist = self.have.get("role_exists") + + if not role_exist: + self.status = "success" + msg = """The requested role {0} has already been deleted from the Cisco Catalyst Center and this has been + successfully verified.""".format(str(self.want.get("role_name"))) + self.log(msg, "INFO") + return self + + self.log("""Mismatch between the playbook input for role {0} and the Cisco Catalyst Center indicates that the deletion was \ + not executed successfully.""".format(str(self.want.get("role_name"))), "INFO") + + elif config["username"] is not None or config["email"] is not None: + self.get_have(config) + self.log("Current State (have): {0}".format(str(self.have)), "INFO") + self.log("Desired State (want): {0}".format(str(self.want)), "INFO") + + user_exist = self.have.get("user_exists") + + if not user_exist: + self.status = "success" + msg = """The requested user {0} has already been deleted from the Cisco Catalyst Center and this has been \ + successfully verified.""".format(str(self.want.get("username"))) + self.log(msg, "INFO") + return self + + self.log("""Mismatch between the playbook input for user {0} and the Cisco Catalyst Center indicates that the deletion \ + was not executed successfully.""".format(str(self.want.get("username"))), "INFO") + + return self + + def snake_to_camel_case(self, data): + """ + Convert keys from snake_case to camelCase in a given dictionary or list of dictionaries recursively. + Parameters: + - data (dict or list): A dictionary with keys in snake_case or a list containing such dictionaries. + Returns: + - dict or list: A new dictionary with keys converted to camelCase, or a list of dictionaries + with keys converted to camelCase. + Description: + - This function recursively converts keys from snake_case to camelCase in a given dictionary or list of dictionaries. + - It handles nested dictionaries and lists, converting all keys in each dictionary found. Lists containing dictionaries + are recursively processed to ensure all contained dictionaries have their keys converted. + """ + + def to_camel_case(snake_str): + components = snake_str.split("_") + camel_case_str = components[0] + for component in components[1:]: + camel_case_str += component.title() + return camel_case_str + + if isinstance(data, dict): + camel_case_data = {} + for key, value in data.items(): + new_key = to_camel_case(key) + + if isinstance(value, dict): + camel_case_data[new_key] = self.snake_to_camel_case(value) + elif isinstance(value, list): + camel_case_list = [] + for item in value: + if isinstance(item, dict): + camel_case_list.append(self.snake_to_camel_case(item)) + else: + camel_case_list.append(item) + camel_case_data[new_key] = camel_case_list + else: + camel_case_data[new_key] = value + + return camel_case_data + elif isinstance(data, list): + camel_case_list = [] + for item in data: + if isinstance(item, dict): + camel_case_list.append(self.snake_to_camel_case(item)) + else: + camel_case_list.append(item) + return camel_case_list + else: + return data + + +def main(): + """ main entry point for module execution + """ + # Basic Ansible type check or assign default. + user_role_details = {"dnac_host": {"required": True, "type": "str"}, + "dnac_port": {"type": "str", "default": "443"}, + "dnac_username": {"type": "str", "default": "admin", 'aliases': ['user']}, + "dnac_password": {"type": "str", "no_log": True}, + "dnac_verify": {"type": "bool", "default": "True"}, + "dnac_version": {"type": "str", "default": "2.2.3.3"}, + "dnac_debug": {"type": "bool", "default": False}, + "dnac_log": {"type": "bool", "default": False}, + "dnac_log_level": {"type": "str", "default": "WARNING"}, + "dnac_log_file_path": {"type": "str", "default": "dnac.log"}, + "config_verify": {"type": "bool", "default": False}, + "dnac_log_append": {"type": "bool", "default": True}, + "dnac_api_task_timeout": {"type": "int", "default": 1200}, + "dnac_task_poll_interval": {"type": "int", "default": 2}, + "config": {"required": True, "type": "dict"}, + "validate_response_schema": {"type": "bool", "default": True}, + "state": {"default": "merged", "choices": ["merged", "deleted"]}, + } + + module = AnsibleModule( + argument_spec=user_role_details, + supports_check_mode=True + ) + + ccc_user_role = UserandRole(module) + state = ccc_user_role.params.get("state") + + if state not in ccc_user_role.supported_states: + ccc_user_role.status = "invalid" + ccc_user_role.msg = "State {0} is invalid".format(state) + ccc_user_role.check_return_status() + + if "role_details" in ccc_user_role.params.get("config"): + ccc_user_role.validate_input_yml(ccc_user_role.params.get("config").get("role_details")).check_return_status() + config_verify = ccc_user_role.params.get("config_verify") + + for config in ccc_user_role.validated_config: + ccc_user_role.reset_values() + ccc_user_role.get_want(config).check_return_status() + ccc_user_role.get_have(config).check_return_status() + ccc_user_role.get_diff_state_apply[state](config).check_return_status() + + if config_verify: + ccc_user_role.verify_diff_state_apply[state](config).check_return_status() + + if "user_details" in ccc_user_role.params.get("config"): + ccc_user_role.validate_input_yml(ccc_user_role.params.get("config").get("user_details")).check_return_status() + config_verify = ccc_user_role.params.get("config_verify") + + for config in ccc_user_role.validated_config: + ccc_user_role.reset_values() + ccc_user_role.get_want(config).check_return_status() + ccc_user_role.get_have(config).check_return_status() + ccc_user_role.get_diff_state_apply[state](config).check_return_status() + + if config_verify: + ccc_user_role.verify_diff_state_apply[state](config).check_return_status() + + module.exit_json(**ccc_user_role.result) + + +if __name__ == "__main__": + main() From 9e3c6baf1c99909f3bbff5b655857ac2ff10e34e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 15 Jul 2024 15:28:53 +0530 Subject: [PATCH 077/119] Addressed the review comments --- ...ise_radius_integration_workflow_manager.py | 19 +++++++++---------- 1 file changed, 9 insertions(+), 10 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index 232cbc273d..b54a933ad8 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -757,7 +757,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if not auth_server_exists: server_type = item.get("server_type") if server_type not in ["ISE", "AAA", None]: - self.msg = "The server_type should be either 'ISE' or 'AAA' but {0} was provided.".format(server_type) + self.msg = "The 'server_type' should be either 'ISE' or 'AAA' but {0} was provided.".format(server_type) self.status = "failed" return self @@ -816,7 +816,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if not auth_server_exists: encryption_scheme = item.get("encryption_scheme") if encryption_scheme not in ["KEYWRAP", "RADSEC", None]: - self.msg = "The encryption_scheme should be in ['KEYWRAP', 'RADSEC']. " + \ + self.msg = "The 'encryption_scheme' should be in ['KEYWRAP', 'RADSEC']. " + \ "It should not be {0}.".format(encryption_scheme) self.status = "failed" return self @@ -842,7 +842,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): encryption_key = item.get("encryption_key") if not encryption_key: - self.msg = "The encryption_key should not be empty if encryption_scheme is 'KEYWRAP'." + self.msg = "The 'encryption_key' should not be empty if encryption_scheme is 'KEYWRAP'." self.status = "failed" return self @@ -949,8 +949,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): if auth_server.get("isIseEnabled"): cisco_ise_dtos = item.get("cisco_ise_dtos") if not cisco_ise_dtos: - self.msg = "Missing parameter 'cisco_ise_dtos' " + \ - "required when server_type is 'ISE'." + self.msg = "The required parameter 'cisco_ise_dtos' is missing for 'server_type' is 'ISE'." self.status = "failed" return self @@ -961,7 +960,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): user_name = ise_credential.get("user_name") if not user_name: if not auth_server_exists: - self.msg = "Missing parameter 'user_name' is required when server_type is ISE." + self.msg = "The required parameter 'user_name' is missing when 'server_type' is 'ISE'." self.status = "failed" return self @@ -973,7 +972,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): password = ise_credential.get("password") if not password: - self.msg = "Missing parameter 'password' is required when server_type is ISE." + self.msg = "The required parameter 'password' is missing when 'server_type' is 'ISE'." self.status = "failed" return self @@ -989,7 +988,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): fqdn = ise_credential.get("fqdn") if not fqdn: if not auth_server_exists: - self.msg = "Missing parameter 'fqdn' is required when server_type is ISE." + self.msg = "The required parameter 'fqdn' is missing when 'server_type' is 'ISE'." self.status = "failed" return self @@ -999,7 +998,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): ip_address = ise_credential.get("ip_address") if not ip_address: - self.msg = "Missing parameter 'ip_address' is required when server_type is ISE." + self.msg = "The required parameter 'ip_address' is missing when 'server_type' is 'ISE'." self.status = "failed" return self @@ -1090,7 +1089,7 @@ def get_want_authentication_policy_server(self, auth_policy_server): try: ise_integration_wait_time_int = int(ise_integration_wait_time) if ise_integration_wait_time_int < 1 or ise_integration_wait_time_int > 120: - self.msg = "The ise_integration_wait_time should be from 1 to 120 seconds." + self.msg = "The 'ise_integration_wait_time' should be from 1 to 120 seconds." self.status = "failed" return self From 570ddbc2fe919ebffbe21ca0177ca5723c419f31 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Mon, 15 Jul 2024 15:36:28 +0530 Subject: [PATCH 078/119] Set the response message in case of failure for any task, fix the issue of creating/updating notification with unsupported events, provide message in console for all the updated devices in inventory. --- plugins/module_utils/dnac.py | 4 +- ...ents_and_notifications_workflow_manager.py | 88 +++++++++---------- plugins/modules/inventory_intent.py | 17 ++-- plugins/modules/inventory_workflow_manager.py | 19 ++-- 4 files changed, 67 insertions(+), 61 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 2133aebbdb..16a17a6fc4 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -231,11 +231,11 @@ def check_return_status(self): # self.log("status: {0}, msg:{1}".format(self.status, self.msg), frameIncrement=1) self.log("status: {0}, msg: {1}".format(self.status, self.msg), "DEBUG") if "failed" in self.status: - self.module.fail_json(msg=self.msg, response=[]) + self.module.fail_json(msg=self.msg, response=self.result.get('response', [])) elif "exited" in self.status: self.module.exit_json(**self.result) elif "invalid" in self.status: - self.module.fail_json(msg=self.msg, response=[]) + self.module.fail_json(msg=self.msg, response=self.result.get('response', [])) def is_valid_password(self, password): """ diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 22f50b7b57..8e034297d7 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1658,11 +1658,10 @@ def add_snmp_destination(self, snmp_params): self.status = "failed" error_messages = response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to Add SNMP destination with name '{0}' in Cisco Catalyst Center".format(snmp_params.get('name')) + self.msg = "Unable to Add SNMP destination with name '{0}' in Cisco Catalyst Center".format(snmp_params.get('name')) - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -1780,11 +1779,10 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): self.status = "failed" error_messages = response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update SNMP destination with name '{0}' in Cisco Catalyst Center".format(update_snmp_params.get('name')) + self.msg = "Unable to update SNMP destination with name '{0}' in Cisco Catalyst Center".format(update_snmp_params.get('name')) - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -1925,11 +1923,10 @@ def add_webhook_destination(self, webhook_params): self.status = "failed" error_messages = response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to Add Webhook destination with name '{0}' in Cisco Catalyst Center".format(webhook_params.get('name')) + self.msg = "Unable to Add Webhook destination with name '{0}' in Cisco Catalyst Center".format(webhook_params.get('name')) - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -2063,11 +2060,10 @@ def update_webhook_destination(self, webhook_params, webhook_dest_detail_in_ccc) error_messages = response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update rest webhook destination with name '{0}' in Cisco Catalyst Center".format(name) + self.msg = "Unable to update rest webhook destination with name '{0}' in Cisco Catalyst Center".format(name) - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -2218,11 +2214,10 @@ def add_email_destination(self, email_params): error_messages = response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to Add Email destination in Cisco Catalyst Center." + self.msg = "Unable to Add Email destination in Cisco Catalyst Center." - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -2319,11 +2314,10 @@ def update_email_destination(self, email_details, email_dest_detail_in_ccc): error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update Email destination in Cisco Catalyst Center." + self.msg = "Unable to update Email destination in Cisco Catalyst Center." - self.msg = failure_msg self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -3200,12 +3194,12 @@ def create_syslog_notification(self, syslog_notification_params): error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to add Syslog Event Notification '{0}' in Cisco Catalyst Center.".format(notification_name) + self.msg = "Unable to add Syslog Event Notification '{0}' in Cisco Catalyst Center.".format(notification_name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -3445,12 +3439,12 @@ def update_syslog_notification(self, syslog_notification_params, syslog_notifica error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update Syslog Event Notification '{0}' in Cisco Catalyst Center.".format(name) + self.msg = "Unable to update Syslog Event Notification '{0}' in Cisco Catalyst Center.".format(name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -3746,12 +3740,12 @@ def create_webhook_notification(self, webhook_notification_params): error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to add Webhook Events Subscription Notification '{0}' in Cisco Catalyst Center.".format(notification_name) + self.msg = "Unable to add Webhook Events Subscription Notification '{0}' in Cisco Catalyst Center.".format(notification_name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -3880,12 +3874,12 @@ def update_webhook_notification(self, webhook_notification_params, webhook_notif error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update webhook Event Subscription Notification '{0}' in Cisco Catalyst Center.".format(name) + self.msg = "Unable to update webhook Event Subscription Notification '{0}' in Cisco Catalyst Center.".format(name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -4239,12 +4233,12 @@ def create_email_notification(self, email_notification_params): error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to add Email Events Subscription Notification '{0}' in Cisco Catalyst Center.".format(notification_name) + self.msg = "Unable to add Email Events Subscription Notification '{0}' in Cisco Catalyst Center.".format(notification_name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -4414,13 +4408,12 @@ def update_email_notification(self, email_notification_params, email_notificatio error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to update Email Event Subscription Notification '{0}' in Cisco Catalyst Center.".format(name) + self.msg = "Unable to update Email Event Subscription Notification '{0}' in Cisco Catalyst Center.".format(name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg - self.msg = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -4471,13 +4464,12 @@ def delete_events_subscription_notification(self, subscription_id, subscription_ error_messages = status_response.get('errorMessage') if error_messages: - failure_msg = error_messages.get('errors') + self.msg = error_messages.get('errors') else: - failure_msg = "Unable to delete Event Subscription Notification '{0}' from Cisco Catalyst Center.".format(subscription_name) + self.msg = "Unable to delete Event Subscription Notification '{0}' from Cisco Catalyst Center.".format(subscription_name) - self.log(failure_msg, "ERROR") - self.result['response'] = failure_msg - self.msg = failure_msg + self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" self.msg = "Exception occurred while deleting Event Subscription Notification '{0}' due to: {1}".format(subscription_name, str(e)) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index 438682b413..c8276b3381 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -2803,13 +2803,11 @@ def check_device_update_execution_response(self, response, device_ip): else: self.msg = "Device Updation for device '{0}' get failed".format(device_ip) self.log(self.msg, "ERROR") + self.result['response'] = self.msg + self.check_return_status() break elif execution_details.get("endTime"): - self.status = "success" - self.result['changed'] = True - self.msg = "Device '{0}' present in Cisco Catalyst Center and have been updated successfully".format(device_ip) - self.result['response'] = self.msg - self.log(self.msg, "INFO") + self.log("Device '{0}' present in Cisco Catalyst Center and have been updated successfully.".format(device_ip), "INFO") break return self @@ -2979,6 +2977,7 @@ def get_diff_merged(self, config): if credential_update: device_to_update = self.get_device_ips_from_config_priority() device_exist = self.is_device_exist_for_update(device_to_update) + update_device_ips = [] if not device_exist: self.msg = """Unable to edit device credentials/details because the device(s) listed: {0} are not present in the @@ -3330,6 +3329,7 @@ def get_diff_merged(self, config): if response and isinstance(response, dict): self.check_device_update_execution_response(response, device_ip) + update_device_ips.append(device_ip) self.check_return_status() except Exception as e: @@ -3337,6 +3337,13 @@ def get_diff_merged(self, config): self.log(error_message, "ERROR") raise Exception(error_message) + if update_device_ips: + self.status = "success" + self.result['changed'] = True + self.msg = "Device(s) '{0}' present in Cisco Catalyst Center and have been updated successfully.".format(str(update_device_ips)) + self.result['response'] = self.msg + self.log(self.msg, "INFO") + # Update list of interface details on specific or list of devices. if self.config[0].get('update_interface_details'): device_to_update = self.get_device_ips_from_config_priority() diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 28aaca3211..9a077cea6d 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -2796,16 +2796,14 @@ def check_device_update_execution_response(self, response, device_ip): else: self.msg = "Device Updation for device '{0}' get failed".format(device_ip) self.log(self.msg, "ERROR") + self.result['response'] = self.msg + self.check_return_status() break elif execution_details.get("endTime"): - self.status = "success" - self.result['changed'] = True - self.msg = "Device '{0}' present in Cisco Catalyst Center and have been updated successfully".format(device_ip) - self.result['response'] = self.msg - self.log(self.msg, "INFO") + self.log("Device '{0}' present in Cisco Catalyst Center and have been updated successfully.".format(device_ip), "INFO") break - return self + return device_ip def is_device_exist_in_ccc(self, device_ip): """ @@ -3161,6 +3159,7 @@ def get_diff_merged(self, config): if credential_update: device_to_update = self.get_device_ips_from_config_priority() + update_device_ips = [] # Update Device details and credentails device_uuids = self.get_device_ids(device_to_update) @@ -3323,6 +3322,7 @@ def get_diff_merged(self, config): if response and isinstance(response, dict): self.check_device_update_execution_response(response, device_ip) + update_device_ips.append(device_ip) self.check_return_status() except Exception as e: @@ -3330,6 +3330,13 @@ def get_diff_merged(self, config): self.log(error_message, "ERROR") raise Exception(error_message) + if update_device_ips: + self.status = "success" + self.result['changed'] = True + self.msg = "Device(s) '{0}' present in Cisco Catalyst Center and have been updated successfully.".format(str(update_device_ips)) + self.result['response'] = self.msg + self.log(self.msg, "INFO") + # Update list of interface details on specific or list of devices. if self.config[0].get('update_interface_details'): device_to_update = self.get_device_ips_from_config_priority() From 075f595d3366e6da35019323eb50f4f36e12a540 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Mon, 15 Jul 2024 16:22:11 +0530 Subject: [PATCH 079/119] Addressed the review comments --- plugins/modules/ise_radius_integration_workflow_manager.py | 5 ++--- 1 file changed, 2 insertions(+), 3 deletions(-) diff --git a/plugins/modules/ise_radius_integration_workflow_manager.py b/plugins/modules/ise_radius_integration_workflow_manager.py index b54a933ad8..f75eb16247 100644 --- a/plugins/modules/ise_radius_integration_workflow_manager.py +++ b/plugins/modules/ise_radius_integration_workflow_manager.py @@ -720,13 +720,12 @@ def get_have(self, config): """ authentication_policy_server = config.get("authentication_policy_server") - if authentication_policy_server is not None: - self.get_have_authentication_policy_server(authentication_policy_server).check_return_status() - else: + if authentication_policy_server is None: self.msg = "The 'authentication_policy_server' is missing in the playbook configuration." self.status = "failed" return self + self.get_have_authentication_policy_server(authentication_policy_server).check_return_status() self.log("Current State (have): {0}".format(self.have), "INFO") self.msg = "Successfully retrieved the details from the Cisco Catalyst Center" self.status = "success" From 83ab76ded68fc971973a57a122da68b612801d0a Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Mon, 15 Jul 2024 16:25:07 +0530 Subject: [PATCH 080/119] update the Add --> add in the log messages of destinations. --- ...vents_and_notifications_workflow_manager.py | 18 +++++++++--------- 1 file changed, 9 insertions(+), 9 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 8e034297d7..53b7de096d 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1365,7 +1365,7 @@ def add_syslog_destination(self, syslog_details): try: failure_msg = response.get('errorMessage').get('errors') except Exception as e: - failure_msg = "Unable to Add syslog destination with name '{0}' in Cisco Catalyst Center".format(name) + failure_msg = "Unable to add syslog destination with name '{0}' in Cisco Catalyst Center".format(name) self.msg = failure_msg self.log(self.msg, "ERROR") @@ -1660,7 +1660,7 @@ def add_snmp_destination(self, snmp_params): if error_messages: self.msg = error_messages.get('errors') else: - self.msg = "Unable to Add SNMP destination with name '{0}' in Cisco Catalyst Center".format(snmp_params.get('name')) + self.msg = "Unable to add SNMP destination with name '{0}' in Cisco Catalyst Center".format(snmp_params.get('name')) self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -1925,7 +1925,7 @@ def add_webhook_destination(self, webhook_params): if error_messages: self.msg = error_messages.get('errors') else: - self.msg = "Unable to Add Webhook destination with name '{0}' in Cisco Catalyst Center".format(webhook_params.get('name')) + self.msg = "Unable to add Webhook destination with name '{0}' in Cisco Catalyst Center".format(webhook_params.get('name')) self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -2216,7 +2216,7 @@ def add_email_destination(self, email_params): if error_messages: self.msg = error_messages.get('errors') else: - self.msg = "Unable to Add Email destination in Cisco Catalyst Center." + self.msg = "Unable to add Email destination in Cisco Catalyst Center." self.log(self.msg, "ERROR") self.result['response'] = self.msg @@ -4547,7 +4547,7 @@ def get_diff_merged(self, config): webhook_dest_detail_in_ccc = self.have.get("webhook_destinations") if not self.have.get("webhook_destinations"): - # Need to Add snmp destination in Cisco Catalyst Center with given playbook params + # Need to add snmp destination in Cisco Catalyst Center with given playbook params if not url: self.status = "failed" self.msg = "Url is required parameter for creating Webhook destination for creating/updating the event in Cisco Catalyst Center." @@ -4588,7 +4588,7 @@ def get_diff_merged(self, config): return self if not self.have.get("email_destination"): - # Need to Add email destination in Cisco Catalyst Center with given playbook params + # Need to add email destination in Cisco Catalyst Center with given playbook params invalid_email_params = [] if email_params.get("primarySMTPConfig") and not email_params.get("primarySMTPConfig").get("hostName"): @@ -4652,7 +4652,7 @@ def get_diff_merged(self, config): syslog_details_in_ccc = self.have.get('syslog_destinations') if not syslog_details_in_ccc: - # We need to Add the Syslog Destination in the Catalyst Center + # We need to add the Syslog Destination in the Catalyst Center self.add_syslog_destination(syslog_details).check_return_status() else: # Check destination needs update and if yes then update Syslog Destination @@ -4703,7 +4703,7 @@ def get_diff_merged(self, config): return self if not self.have.get("snmp_destinations"): - # Need to Add snmp destination in Cisco Catalyst Center with given playbook params + # Need to add snmp destination in Cisco Catalyst Center with given playbook params self.check_snmp_required_parameters(snmp_params).check_return_status() self.log("""Required parameter validated successfully for adding SNMP Destination with name '{0}' in Cisco Catalyst Center.""".format(destination), "INFO") @@ -4740,7 +4740,7 @@ def get_diff_merged(self, config): itsm_id = itsm_detail_in_ccc[0].get("id") if not itsm_detail_in_ccc: - # Need to Add snmp destination in Cisco Catalyst Center with given playbook params + # Need to add snmp destination in Cisco Catalyst Center with given playbook params invalid_itsm_params = [] invalid_itsm_params = self.check_required_itsm_param(itsm_params, invalid_itsm_params) connection_setting = itsm_params.get('data').get('ConnectionSettings') From 6b6392d9c93f7c2874a633284ca3ee002536c0e6 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 17 Jul 2024 15:53:22 +0530 Subject: [PATCH 081/119] Update the log messages in the console for scaled set up having multiple destinations and events subscription notifications --- ...ents_and_notifications_workflow_manager.py | 227 ++++++++++++++---- 1 file changed, 176 insertions(+), 51 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 53b7de096d..9f9884e9e8 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -941,6 +941,9 @@ class Events(DnacBase): def __init__(self, module): super().__init__(module) self.supported_states = ["merged", "deleted"] + self.create_dest, self.update_dest, self.no_update_dest = [], [], [] + self.create_notification, self.update_notification, self.no_update_notification = [], [], [] + self.delete_dest, self.delete_notification, self.absent_dest, self.absent_notification = [], [], [], [] def validate_input(self): """ @@ -1094,6 +1097,7 @@ def validate_input(self): self.msg = "The playbook contains invalid parameters: {0}".format(invalid_params) self.log(self.msg, "ERROR") self.status = "failed" + self.result['response'] = self.msg return self self.validated_config = valid_temp @@ -1264,6 +1268,7 @@ def get_syslog_destination_in_ccc(self, name): self.status = "failed" self.msg = "Error while getting the details of Syslog destination present in Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() def syslog_dest_needs_update(self, syslog_details, syslog_details_in_ccc): @@ -1325,6 +1330,7 @@ def add_syslog_destination(self, syslog_details): self.status = "failed" self.msg = "Protocol is needed while configuring the syslog destionation with name '{0}' in Cisco Catalyst Center".format(name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self protocol = protocol.upper() @@ -1333,6 +1339,7 @@ def add_syslog_destination(self, syslog_details): self.msg = """Invalid protocol name '{0}' for creating syslog destination in Cisco Catalyst Center. Select one of the following protocol 'TCP/UDP'.""".format(protocol) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self port = syslog_details.get('port', 514) @@ -1358,7 +1365,7 @@ def add_syslog_destination(self, syslog_details): self.result['changed'] = True self.msg = "Syslog Destination with name '{0}' added successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_dest.append(name) return self self.status = "failed" @@ -1411,6 +1418,7 @@ def update_syslog_destination(self, syslog_details, syslog_details_in_ccc): self.msg = """Invalid protocol name '{0}' for updating syslog destination in Cisco Catalyst Center. Select one of the following protocol 'TCP/UDP'.""".format(update_syslog_params.get('protocol')) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self response = self.dnac._exec( @@ -1427,7 +1435,7 @@ def update_syslog_destination(self, syslog_details, syslog_details_in_ccc): self.result['changed'] = True self.msg = "Syslog Destination with name '{0}' updated successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_dest.append(name) return self self.status = "failed" @@ -1530,12 +1538,14 @@ def collect_snmp_playbook_params(self, snmp_details): self.status = "failed" self.msg = "Invalid SNMP version '{0}' given in the playbook for configuring SNMP destination".format(snmp_version) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if server_address and not self.is_valid_server_address(server_address): self.status = "failed" self.msg = "Invalid server address '{0}' given in the playbook for configuring SNMP destination".format(server_address) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if snmp_version == "V2C": @@ -1551,6 +1561,7 @@ def collect_snmp_playbook_params(self, snmp_details): self.msg = """Invalid SNMP Mode '{0}' given in the playbook for configuring SNMP destination. Please select one of the mode - AUTH_PRIVACY, AUTH_NO_PRIVACY, NO_AUTH_NO_PRIVACY in the playbook""".format(mode) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if auth_type and auth_type not in ["SHA", "MD5"]: @@ -1558,6 +1569,7 @@ def collect_snmp_playbook_params(self, snmp_details): self.msg = """Invalid SNMP Authentication Type '{0}' given in the playbook for configuring SNMP destination. Please select either SHA or MD5 as authentication type in the playbook""".format(auth_type) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if playbook_params.get("snmpMode") == "AUTH_PRIVACY": @@ -1614,6 +1626,7 @@ def check_snmp_required_parameters(self, snmp_params): self.status = "failed" self.msg = "Required parameter '{0}' is missing for adding SNMP Destination in Cisco Catalyst Center".format(str(missing_params_list)) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self @@ -1652,7 +1665,7 @@ def add_snmp_destination(self, snmp_params): self.result['changed'] = True self.msg = "SNMP Destination with name '{0}' added successfully in Cisco Catalyst Center".format(snmp_params.get('name')) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_dest.append(snmp_params.get('name')) return self self.status = "failed" @@ -1735,6 +1748,7 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): self.status = "failed" self.msg = "Invalid Notification trap port '{0}' given in playbook. Select port from the number range(1, 65535)".format(port) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self except Exception as e: self.status = "failed" @@ -1773,7 +1787,7 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): self.result['changed'] = True self.msg = "SNMP Destination with name '{0}' updated successfully in Cisco Catalyst Center".format(update_snmp_params.get('name')) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_dest.append(update_snmp_params.get('name')) return self self.status = "failed" @@ -1917,7 +1931,7 @@ def add_webhook_destination(self, webhook_params): self.result['changed'] = True self.msg = "Webhook Destination with name '{0}' added successfully in Cisco Catalyst Center".format(webhook_params.get('name')) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_dest.append(webhook_params.get('name')) return self self.status = "failed" @@ -2053,7 +2067,7 @@ def update_webhook_destination(self, webhook_params, webhook_dest_detail_in_ccc) self.result['changed'] = True self.msg = "Rest Webhook Destination with name '{0}' updated successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_dest.append(name) return self self.status = "failed" @@ -2135,6 +2149,7 @@ def collect_email_playbook_params(self, email_details): self.msg = """Invalid Primary SMTP Type '{0}' given in the playbook for configuring primary smtp server. Please select one of the type - DEFAULT, TLS, SSL in the playbook""".format(primary_smtp_type) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() playbook_params['primarySMTPConfig'] = {} @@ -2157,6 +2172,7 @@ def collect_email_playbook_params(self, email_details): self.msg = """Invalid Secondary SMTP Type '{0}' given in the playbook for configuring secondary smtp server. Please select one of the type - DEFAULT, TLS, SSL in the playbook""".format(secondary_smtp_type) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() playbook_params['secondarySMTPConfig'] = {} @@ -2207,7 +2223,7 @@ def add_email_destination(self, email_params): self.result['changed'] = True self.msg = "Email Destination added successfully in Cisco Catalyst Center" self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_dest.append("Email destination") return self self.status = "failed" @@ -2247,6 +2263,9 @@ def email_dest_needs_update(self, email_params, email_dest_detail_in_ccc): update_needed = False for key, value in email_params.items(): + if not value: + continue + if not email_dest_detail_in_ccc.get(key): update_needed = True break @@ -2304,10 +2323,9 @@ def update_email_destination(self, email_details, email_dest_detail_in_ccc): if status_response['apiStatus'] == "SUCCESS": self.status = "success" - self.result['changed'] = True self.msg = "Email Destination updated successfully in Cisco Catalyst Center" self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_dest.append("Email destination") return self self.status = "failed" @@ -2490,7 +2508,7 @@ def create_itsm_integration_setting(self, itsm_params): self.result['changed'] = True self.msg = "ITSM Integration Settings with name '{0}' has been created successfully in Cisco Catalyst Center".format(instance_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_dest.append(instance_name) return self self.status = "failed" @@ -2593,6 +2611,7 @@ def update_itsm_integration_setting(self, itsm_params, itsm_in_ccc): self.msg = """Unable to update ITSM setting '{0}' as 'Auth Password' is the required parameter for updating ITSM Intergartion setting.""".format(update_itsm_params.get('name')) self.log(self.msg, "INFO") + self.result['response'] = self.msg return self update_itsm_params['data']['ConnectionSettings']['Auth_Password'] = connection_params.get('Auth_Password') @@ -2605,6 +2624,7 @@ def update_itsm_integration_setting(self, itsm_params, itsm_in_ccc): self.status = "failed" self.msg = "Given url '{0}' is invalid url for ITSM Intergartion setting. It must start with 'https://'".format(url) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self itsm_param_dict = { @@ -2626,10 +2646,10 @@ def update_itsm_integration_setting(self, itsm_params, itsm_in_ccc): self.status = "success" self.result['changed'] = True self.msg = ( - "ITSM Integration Settings with name '{0}' has been updated successfully in Cisco Catalyst Center" - ).format(update_itsm_params.get('name')) + "ITSM Integration Settings with name '{0}' has been updated successfully in Cisco Catalyst Center." + ).format(update_itsm_params.get("name")) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_dest.append(update_itsm_params.get("name")) return self self.status = "failed" @@ -2681,12 +2701,13 @@ def delete_itsm_integration_setting(self, itsm_name, itsm_id): self.status = "success" self.log(self.msg, "INFO") self.result['changed'] = True - self.result['response'] = self.msg + self.delete_dest.append(itsm_name) return self self.status = "failed" self.msg = "Cannot delete ITSM Integration settings instance with name '{0}' from Cisco Catalyst Center".format(itsm_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg except Exception as e: self.status = "failed" @@ -2738,6 +2759,7 @@ def get_syslog_notification_details(self, name): "from Cisco Catalyst Center: {0}".format(repr(e)) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() def get_syslog_subscription_detail(self, destination): @@ -2808,6 +2830,7 @@ def is_valid_event_types(self, event_types): self.status = "failed" self.msg = "Given event types '{0}' should be a list of strings.".format(event_types) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self for e_type in event_types: @@ -2822,6 +2845,7 @@ def is_valid_event_types(self, event_types): " types.".format(invalid_event_types) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self @@ -2847,6 +2871,7 @@ def is_valid_event_categories(self, event_categories): self.status = "failed" self.msg = "Given event categories '{0}' should be a list of strings.".format(event_categories) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self for category in event_categories: @@ -2861,6 +2886,7 @@ def is_valid_event_categories(self, event_categories): .format(invalid_event_categories) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self @@ -2885,6 +2911,7 @@ def is_valid_event_severities(self, event_severities): self.status = "failed" self.msg = "Given event severities '{0}' should be a list of strings.".format(event_severities) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self for severity in event_severities: @@ -2903,6 +2930,7 @@ def is_valid_event_severities(self, event_severities): "Severity levels must be integers within the range 1 to 5.".format(invalid_event_severities) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self @@ -3032,6 +3060,7 @@ def collect_syslog_notification_playbook_params(self, syslog_notification_detail self.msg = """Unable to create/update the syslog event notification '{0}' as syslog desination '{1}' is not configured or present in Cisco Catalyst Center""".format(name, destination) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() instance_id = subscription_details.get('instanceId') @@ -3054,6 +3083,7 @@ def collect_syslog_notification_playbook_params(self, syslog_notification_detail "are incorrect or could not be found." ).format(str(events)) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() playbook_params["filter"]["eventIds"] = events_ids @@ -3144,6 +3174,7 @@ def mandatory_syslog_notification_parameter_check(self, syslog_notification_para self.msg = """Missing required parameter '{0}' for adding Syslog Event Notification with given name {1}""".format(str(required_params_absent), notification_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() return self @@ -3187,7 +3218,7 @@ def create_syslog_notification(self, syslog_notification_params): self.result['changed'] = True self.msg = "Syslog Event Notification '{0}' created successfully in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_notification.append(notification_name) return self self.status = "failed" @@ -3432,7 +3463,7 @@ def update_syslog_notification(self, syslog_notification_params, syslog_notifica self.result['changed'] = True self.msg = "Syslog Event Notification '{0}' updated successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_notification.append(name) return self self.status = "failed" @@ -3576,6 +3607,7 @@ def collect_webhook_notification_playbook_params(self, webhook_notification_deta self.msg = """Unable to create/update the webhook event notification '{0}' as webhook desination '{1}' is not configured or present in Cisco Catalyst Center""".format(name, destination) self.log(self.msg, "ERROR") + self.result["response"] = self.msg self.check_return_status() instance_id = subscription_details.get('instanceId') @@ -3598,6 +3630,7 @@ def collect_webhook_notification_playbook_params(self, webhook_notification_deta "are incorrect or could not be found." ).format(str(events)) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() playbook_params["filter"]["eventIds"] = events_ids @@ -3690,6 +3723,7 @@ def mandatory_webhook_notification_parameter_check(self, webhook_notification_pa "name '{1}'." ).format(str(required_params_absent), notification_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() return self @@ -3733,7 +3767,7 @@ def create_webhook_notification(self, webhook_notification_params): self.result['changed'] = True self.msg = "Webhook Event Subscription Notification '{0}' created successfully in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_notification.append(notification_name) return self self.status = "failed" @@ -3867,7 +3901,7 @@ def update_webhook_notification(self, webhook_notification_params, webhook_notif self.result['changed'] = True self.msg = "Webhook Event Subscription Notification '{0}' updated successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_notification.append(name) return self self.status = "failed" @@ -4008,6 +4042,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) self.status = "failed" self.msg = "Instance name for Subscription Endpoints is required for Email notification '{0}'.".format(email_notf_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() subscription_details = self.get_email_subscription_detail(instance) @@ -4032,6 +4067,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "in the playbook to create/update the Email Events Subscription Notification" ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if not recipient_emails: @@ -4041,6 +4077,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "in the playbook to create/update the Email Events Subscription Notification" ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if not subject: @@ -4050,6 +4087,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "in the playbook to create/update the Email Events Subscription Notification" ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() if not self.is_valid_email(sender_email): @@ -4059,6 +4097,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "are incorrect or invalid given in the playbook." ).format(sender_email) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() for email in recipient_emails: @@ -4069,6 +4108,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "is incorrect or invalid given in the playbook." ).format(email) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() temp_subscript_endpoint = { @@ -4094,6 +4134,7 @@ def collect_email_notification_playbook_params(self, email_notification_details) "are incorrect or could not be found." ).format(str(events)) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() playbook_params["filter"]["eventIds"] = events_ids @@ -4182,6 +4223,7 @@ def mandatory_email_notification_parameter_check(self, email_notification_params missing_params = ", ".join(required_params_absent) self.msg = "Missing required parameters [{0}] for adding Email Events Subscription Notification '{1}'.".format(missing_params, notification_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg self.check_return_status() self.log("All mandatory parameters for Email Event Subscription Notification are present.", "INFO") @@ -4226,7 +4268,7 @@ def create_email_notification(self, email_notification_params): self.result['changed'] = True self.msg = "Email Event Subscription Notification '{0}' created successfully in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.create_notification.append(notification_name) return self self.status = "failed" @@ -4401,7 +4443,7 @@ def update_email_notification(self, email_notification_params, email_notificatio self.result['changed'] = True self.msg = "Email Event Subscription Notification '{0}' updated successfully in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.update_notification.append(name) return self self.status = "failed" @@ -4457,7 +4499,7 @@ def delete_events_subscription_notification(self, subscription_id, subscription_ self.result['changed'] = True self.msg = "Event Subscription Notification '{0}' deleted successfully from Cisco Catalyst Center".format(subscription_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.delete_notification.append(subscription_name) return self self.status = "failed" @@ -4477,6 +4519,74 @@ def delete_events_subscription_notification(self, subscription_id, subscription_ return self + def update_destination_notification_messages(self): + """ + Update site messages based on the status of created, updated, and deleted sites. + Args: + self (object): An instance of a class used for interacting with Cisco Catalyst Center. + Returns: + self (object): An instance of a class representing the status of the operation, including whether it was + successful or failed, any error messages encountered during operation. + Description: + This method updates the messages related to site creation, updating, and deletion in the Cisco Catalyst Center. + It evaluates the status of created sites, updated sites, and sites that are no longer needed for update to + determine the appropriate message to be set. The messages are then stored in the 'msg' attribute of the object. + """ + + self.result["changed"] = False + result_msg_list = [] + + if self.create_dest: + create_dest_msg = "Given destination(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_dest) + result_msg_list.append(create_dest_msg) + + if self.update_dest: + update_dest_msg = "Given destination(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_dest) + result_msg_list.append(update_dest_msg) + + if self.no_update_dest: + no_update_dest_msg = "Given destination(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_dest) + result_msg_list.append(no_update_dest_msg) + + if self.create_notification: + create_notf_msg = "Given Events subscription notification(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_notification) + result_msg_list.append(create_notf_msg) + + if self.update_notification: + update_notf_msg = "Given Events subscription notification(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_notification) + result_msg_list.append(update_notf_msg) + + if self.no_update_notification: + no_update_notf_msg = "Given Events subscription notification(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_notification) + result_msg_list.append(no_update_notf_msg) + + if self.delete_dest: + delete_dest_msg = "Given destination(s) '{0}' deleted successfully from the Cisco Catalyst Center.".format(self.delete_dest) + result_msg_list.append(delete_dest_msg) + + if self.absent_dest: + absent_dest_msg = "Unable to delete the following destination(s) '{0}' as they are not present in Cisco Catalyst Center.".format(self.absent_dest) + result_msg_list.append(absent_dest_msg) + + if self.delete_notification: + delete_notification_msg = """Given Events subscription notification(s) '{0}' deleted successfully from the Cisco Catalyst + Center.""".format(self.delete_notification) + result_msg_list.append(delete_notification_msg) + + if self.absent_notification: + absent_notification_msg = """Unable to delete the following Events subscription notification(s) '{0}' as they are not present in + Cisco Catalyst Center.""".format(self.absent_notification) + result_msg_list.append(absent_notification_msg) + + if self.create_dest or self.update_dest or self.create_notification or self.update_notification or self.delete_dest or self.delete_notification: + self.result["changed"] = True + + self.msg = " ".join(result_msg_list) + self.log(self.msg, "INFO") + self.result["response"] = self.msg + + return self + def get_diff_merged(self, config): """ Processes the configuration difference and merges them into Cisco Catalyst Center. @@ -4509,6 +4619,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Name is required parameter for adding/updating Webhook destination for creating/updating the event." self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self webhook_params = self.collect_webhook_playbook_params(webhook_details) @@ -4533,6 +4644,7 @@ def get_diff_merged(self, config): "'https://' and follow the valid https url format.".format(url) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if webhook_params.get("method") and webhook_params.get("method") not in ["POST", "PUT"]: @@ -4542,6 +4654,7 @@ def get_diff_merged(self, config): "Select one of the following method 'POST/PUT'.".format(webhook_params.get('method')) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self webhook_dest_detail_in_ccc = self.have.get("webhook_destinations") @@ -4552,6 +4665,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Url is required parameter for creating Webhook destination for creating/updating the event in Cisco Catalyst Center." self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self self.add_webhook_destination(webhook_params).check_return_status() @@ -4562,8 +4676,7 @@ def get_diff_merged(self, config): if not webhook_need_update: self.msg = "Webhook Destination with name '{0}' needs no update in Cisco Catalyst Center".format(destination) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_dest.append(destination) else: # Update the syslog destination with given self.update_webhook_destination(webhook_params, webhook_dest_detail_in_ccc).check_return_status() @@ -4585,6 +4698,7 @@ def get_diff_merged(self, config): "address so unable to add/update the email destination in CCC".format(server_address) ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if not self.have.get("email_destination"): @@ -4610,8 +4724,7 @@ def get_diff_merged(self, config): if not email_need_update: self.msg = "Email Destination needs no update in Cisco Catalyst Center" self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_dest.append("Email destination") else: # Update the email destination with given details in the playbook self.update_email_destination(email_params, email_dest_detail_in_ccc).check_return_status() @@ -4627,6 +4740,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Name is required parameter for adding/updating syslog destination for creating/updating the event." self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if isinstance(port, str): @@ -4635,18 +4749,21 @@ def get_diff_merged(self, config): self.msg = """Invalid Syslog destination port '{0}' given in playbook. Please choose a port within the range of numbers (1, 65535)""".format(port) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if isinstance(port, int) and (int(port) not in range(1, 65536)): self.status = "failed" self.msg = "Invalid Syslog destination port '{0}' given in playbook. Please choose a port within the range of numbers (1, 65535)".format(port) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if server_address and not self.is_valid_server_address(server_address): self.status = "failed" self.msg = "Invalid server address '{0}' given in the playbook for configuring Syslog destination".format(server_address) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self syslog_details_in_ccc = self.have.get('syslog_destinations') @@ -4660,8 +4777,7 @@ def get_diff_merged(self, config): if not syslog_need_update: self.msg = "Syslog Destination with name '{0}' needs no update in Cisco Catalyst Center".format(name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_dest.append(name) else: # Update the syslog destination with given self.update_syslog_destination(syslog_details, syslog_details_in_ccc).check_return_status() @@ -4675,6 +4791,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Name is required parameter for adding/updating SNMP destination for creating/updating the event." self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self snmp_params = self.collect_snmp_playbook_params(snmp_details) @@ -4687,11 +4804,13 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Invalid Notification trap port '{0}' given in playbook. Select port from the number range(1, 65535)".format(port) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self except Exception as e: self.status = "failed" self.msg = "Invalid Notification trap port '{0}' given in playbook. Select port from the number range(1, 65535)".format(port) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self privacy_type = snmp_params.get("snmpPrivacyType") @@ -4700,6 +4819,7 @@ def get_diff_merged(self, config): self.msg = """Invalid SNMP Privacy type '{0}' given in playbook. Select either AES128/DES as privacy type to add/update the snmp destination '{1}' in the Cisco Catalyst Center.""".format(privacy_type, destination) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if not self.have.get("snmp_destinations"): @@ -4714,6 +4834,7 @@ def get_diff_merged(self, config): if not snmp_need_update: self.msg = "SNMP Destination with name '{0}' needs no update in Cisco Catalyst Center".format(destination) self.log(self.msg, "INFO") + self.no_update_dest.append(destination) self.result['changed'] = False self.result['response'] = self.msg else: @@ -4728,6 +4849,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Instance name is required parameter for adding/updating ITSM integration setting in Cisco Catalyst Center." self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self itsm_params = self.collect_itsm_playbook_params(itsm_details) @@ -4776,6 +4898,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Given url '{0}' is invalid url for ITSM Intergartion setting. It must starts with 'https://'".format(url) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self self.log("Required parameter validated successfully for configuring ITSM Intergartion setting in Cisco Catalyst Center.", "INFO") @@ -4786,6 +4909,7 @@ def get_diff_merged(self, config): self.status = "failed" self.msg = "Unable to update as there is no ITSM Integration setting with name '{0}' present in Cisco Catalyst Center".format(itsm_name) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self # Check destination needs update and if yes then update Email Destination @@ -4794,8 +4918,7 @@ def get_diff_merged(self, config): if not itsm_need_update: self.msg = "ITSM Intergartion setting with name '{0}' needs no update in Cisco Catalyst Center".format(itsm_name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_dest.append(itsm_name) else: # Update the ITSM integration settings with given details in the playbook self.update_itsm_integration_setting(itsm_params, itsm_in_ccc).check_return_status() @@ -4812,6 +4935,7 @@ def get_diff_merged(self, config): "in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self webhook_notification_params = self.collect_webhook_notification_playbook_params(webhook_notification_details) @@ -4829,8 +4953,7 @@ def get_diff_merged(self, config): if not notification_update: self.msg = "Webhook Notification with name '{0}' needs no update in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_notification.append(notification_name) else: # Update the webhook notification with given playbook parameters self.update_webhook_notification(webhook_notification_params, webhook_notification_in_ccc).check_return_status() @@ -4847,6 +4970,7 @@ def get_diff_merged(self, config): "in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self email_notification_params = self.collect_email_notification_playbook_params(email_notification_details) @@ -4865,8 +4989,7 @@ def get_diff_merged(self, config): if not notification_update: self.msg = "Email Notification with name '{0}' needs no update in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_notification.append(notification_name) else: # Update the email notification with given playbook parameters self.update_email_notification(email_notification_params, email_notification_in_ccc).check_return_status() @@ -4883,6 +5006,7 @@ def get_diff_merged(self, config): "in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self syslog_notification_params = self.collect_syslog_notification_playbook_params(syslog_notification_details) @@ -4900,8 +5024,7 @@ def get_diff_merged(self, config): if not sys_notification_update: self.msg = "Syslog Notification with name '{0}' needs no update in Cisco Catalyst Center".format(notification_name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.no_update_notification.append(notification_name) else: # Update the syslog notification with given playbook parameters self.update_syslog_notification(syslog_notification_params, syslog_notification_in_ccc).check_return_status() @@ -4928,6 +5051,7 @@ def get_diff_deleted(self, config): self.msg = "Deleting the Webhook destination is not supported in Cisco Catalyst Center because of API limitations" self.log(self.msg, "ERROR") self.result['changed'] = False + self.result['response'] = self.msg return self if config.get('email_destination'): @@ -4935,6 +5059,7 @@ def get_diff_deleted(self, config): self.msg = "Deleting the Email destination is not supported in Cisco Catalyst Center because of API limitations" self.log(self.msg, "ERROR") self.result['changed'] = False + self.result['response'] = self.msg return self if config.get('syslog_destination'): @@ -4942,6 +5067,7 @@ def get_diff_deleted(self, config): self.msg = "Deleting the Syslog destination is not supported in Cisco Catalyst Center because of API limitations" self.log(self.msg, "ERROR") self.result['changed'] = False + self.result['response'] = self.msg return self if config.get('snmp_destination'): @@ -4949,6 +5075,7 @@ def get_diff_deleted(self, config): self.msg = "Deleting the SNMP destination is not supported in Cisco Catalyst Center because of API limitations" self.log(self.msg, "ERROR") self.result['changed'] = False + self.result['response'] = self.msg return self # Delete ITSM Integration setting from Cisco Catalyst Center @@ -4958,11 +5085,10 @@ def get_diff_deleted(self, config): itsm_detail_in_ccc = self.have.get('itsm_setting') if not itsm_detail_in_ccc: self.status = "success" - self.result['changed'] = False self.msg = """There is no ITSM Intergartion setting present in Cisco Catalyst Center so cannot delete the ITSM Integartion setting with name '{0}'""".format(itsm_name) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.absent_dest.append(itsm_name) return self # Check whether the given itsm integration present in Catalyst Center or not @@ -4977,8 +5103,7 @@ def get_diff_deleted(self, config): else: self.msg = "Unable to delete ITSM Integartion setting with name '{0}' as it is not present in Cisco Catalyst Center".format(itsm_name) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.absent_dest.append(itsm_name) # Delete Webhook Events Subscription Notification from Cisco Catalyst Center if config.get('webhook_event_notification'): @@ -4992,17 +5117,17 @@ def get_diff_deleted(self, config): " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if not self.have.get("webhook_subscription_notifications"): self.status = "success" - self.result['changed'] = False self.msg = ( "There is no Webhook Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(webhook_notification_name) ) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.absent_notification.append(webhook_notification_name) return self webhook_notification_id = self.have.get("webhook_subscription_notifications")[0].get("subscriptionId") @@ -5015,8 +5140,7 @@ def get_diff_deleted(self, config): "Cisco Catalyst Center.".format(webhook_notification_name) ) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.absent_notification.append(webhook_notification_name) # Delete Email Events Subscription Notification from Cisco Catalyst Center if config.get('email_event_notification'): @@ -5030,17 +5154,17 @@ def get_diff_deleted(self, config): " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if not self.have.get("email_subscription_notifications"): self.status = "success" - self.result['changed'] = False self.msg = ( "There is no Email Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(email_notification_name) ) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.absent_notification.append(email_notification_name) return self email_notification_id = self.have.get("email_subscription_notifications")[0].get("subscriptionId") @@ -5053,8 +5177,7 @@ def get_diff_deleted(self, config): "Cisco Catalyst Center.".format(email_notification_name) ) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.absent_notification.append(email_notification_name) # Delete Syslog Events Subscription Notification from Cisco Catalyst Center if config.get('syslog_event_notification'): @@ -5068,17 +5191,17 @@ def get_diff_deleted(self, config): " in Cisco Catalyst Center." ) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if not self.have.get("syslog_subscription_notifications"): self.status = "success" - self.result['changed'] = False self.msg = ( "There is no Syslog Event Subscription Notification with name '{0}' present in in Cisco Catalyst Center " "so cannot delete the notification.".format(syslog_notification_name) ) self.log(self.msg, "INFO") - self.result['response'] = self.msg + self.absent_notification.append(syslog_notification_name) return self syslog_notification_id = self.have.get("syslog_subscription_notifications")[0].get("subscriptionId") @@ -5091,8 +5214,7 @@ def get_diff_deleted(self, config): "Cisco Catalyst Center.".format(syslog_notification_name) ) self.log(self.msg, "INFO") - self.result['changed'] = False - self.result['response'] = self.msg + self.absent_notification.append(syslog_notification_name) return self @@ -5337,6 +5459,9 @@ def main(): if config_verify: ccc_events.verify_diff_state_apply[state](config).check_return_status() + # Invoke the API to check the status and log the output of each destination and notification on the console + ccc_events.update_destination_notification_messages().check_return_status() + module.exit_json(**ccc_events.result) From 76b2e49139b8e2e3655a2ade4c399bb6e3c46809 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 17 Jul 2024 16:04:00 +0530 Subject: [PATCH 082/119] update the docstring for the method update_destination_notification_messages --- ...ents_and_notifications_workflow_manager.py | 21 ++++++++++++++----- 1 file changed, 16 insertions(+), 5 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 9f9884e9e8..2113a35aa4 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -4521,16 +4521,27 @@ def delete_events_subscription_notification(self, subscription_id, subscription_ def update_destination_notification_messages(self): """ - Update site messages based on the status of created, updated, and deleted sites. + Updates the destination and notification messages for Cisco Catalyst Center. Args: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + self (object): Instance of the class containing attributes for destinations and notifications. + Attributes: + self.create_dest (list): List of destinations to be created. + self.update_dest (list): List of destinations to be updated. + self.no_update_dest (list): List of destinations that need no update. + self.create_notification (list): List of notifications to be created. + self.update_notification (list): List of notifications to be updated. + self.no_update_notification (list): List of notifications that need no update. + self.delete_dest (list): List of destinations to be deleted. + self.absent_dest (list): List of destinations that are not present or cannot be deleted. + self.delete_notification (list): List of notifications to be deleted. + self.absent_notification (list): List of notifications that are not present and cannot be deleted. Returns: self (object): An instance of a class representing the status of the operation, including whether it was successful or failed, any error messages encountered during operation. Description: - This method updates the messages related to site creation, updating, and deletion in the Cisco Catalyst Center. - It evaluates the status of created sites, updated sites, and sites that are no longer needed for update to - determine the appropriate message to be set. The messages are then stored in the 'msg' attribute of the object. + This method constructs and logs messages based on the actions performed (create, update, or delete) + on destinations and event subscription notifications. It updates the `self.result` dictionary to + indicate if changes were made and compiles the messages into a single string. """ self.result["changed"] = False From b1d79781845edde7a7280f15fddcdc6f9b4e5e16 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 17 Jul 2024 19:08:33 +0530 Subject: [PATCH 083/119] addressed reveiw comments --- ...ents_and_notifications_workflow_manager.py | 26 ++++++++++--------- 1 file changed, 14 insertions(+), 12 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 2113a35aa4..349259a8a3 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -4548,45 +4548,47 @@ def update_destination_notification_messages(self): result_msg_list = [] if self.create_dest: - create_dest_msg = "Given destination(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_dest) + create_dest_msg = "Destination(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_dest) result_msg_list.append(create_dest_msg) if self.update_dest: - update_dest_msg = "Given destination(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_dest) + update_dest_msg = "Destination(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_dest) result_msg_list.append(update_dest_msg) if self.no_update_dest: - no_update_dest_msg = "Given destination(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_dest) + no_update_dest_msg = "Destination(s) '{0}' need no update in Cisco Catalyst Center.".format(self.no_update_dest) result_msg_list.append(no_update_dest_msg) if self.create_notification: - create_notf_msg = "Given Events subscription notification(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_notification) + create_notf_msg = "Event subscription notification(s) '{0}' created successfully in Cisco Catalyst Center.".format(self.create_notification) result_msg_list.append(create_notf_msg) if self.update_notification: - update_notf_msg = "Given Events subscription notification(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_notification) + update_notf_msg = "Event subscription notification(s) '{0}' updated successfully in Cisco Catalyst Center.".format(self.update_notification) result_msg_list.append(update_notf_msg) if self.no_update_notification: - no_update_notf_msg = "Given Events subscription notification(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_notification) + no_update_notf_msg = "Event subscription notification(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_notification) result_msg_list.append(no_update_notf_msg) if self.delete_dest: - delete_dest_msg = "Given destination(s) '{0}' deleted successfully from the Cisco Catalyst Center.".format(self.delete_dest) + delete_dest_msg = "Destination(s) '{0}' deleted successfully from the Cisco Catalyst Center.".format(self.delete_dest) result_msg_list.append(delete_dest_msg) if self.absent_dest: - absent_dest_msg = "Unable to delete the following destination(s) '{0}' as they are not present in Cisco Catalyst Center.".format(self.absent_dest) + absent_dest_msg = "Unable to delete destination(s) '{0}' as they are not present in Cisco Catalyst Center.".format(self.absent_dest) result_msg_list.append(absent_dest_msg) if self.delete_notification: - delete_notification_msg = """Given Events subscription notification(s) '{0}' deleted successfully from the Cisco Catalyst - Center.""".format(self.delete_notification) + delete_notification_msg = ( + "Events subscription notification(s) '{0}' deleted successfully from the Cisco Catalyst Center." + ).format(self.delete_notification) result_msg_list.append(delete_notification_msg) if self.absent_notification: - absent_notification_msg = """Unable to delete the following Events subscription notification(s) '{0}' as they are not present in - Cisco Catalyst Center.""".format(self.absent_notification) + absent_notification_msg = ( + "Unable to delete event subscription notifications '{0}' as they are not present in Cisco Catalyst Center." + ).format(self.absent_notification) result_msg_list.append(absent_notification_msg) if self.create_dest or self.update_dest or self.create_notification or self.update_notification or self.delete_dest or self.delete_notification: From 20d1d2e3f88f49a9631e7f758fcd08eb5742dbef Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Wed, 17 Jul 2024 13:57:47 -0700 Subject: [PATCH 084/119] ITs, bug fix in dnac.py and UTs dnac_module.py --- plugins/module_utils/dnac.py | 3 +- .../test_network_compliance_management.yml | 309 ++++++++++++++++-- .../vars_network_compliance_management.yml | 42 ++- tests/unit/modules/dnac/dnac_module.py | 139 +------- 4 files changed, 321 insertions(+), 172 deletions(-) diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index a268f0ad10..b70e940f28 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -81,9 +81,10 @@ def __init__(self, module): self.logger = logging.getLogger('logger') DnacBase.__is_log_init = True self.log('Logging configured and initiated', "DEBUG") - elif not self.dnac_log: + else: # If dnac_log is False, return an empty logger self.logger = logging.getLogger('empty_logger') + self.logger.addHandler(logging.NullHandler()) self.log('Cisco Catalyst Center parameters: {0}'.format(dnac_params), "DEBUG") self.supported_states = ["merged", "deleted", "replaced", "overridden", "gathered", "rendered", "parsed"] diff --git a/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml b/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml index ed78329877..9259bfbf62 100644 --- a/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml +++ b/tests/integration/ccc_network_compliance_management/tests/test_network_compliance_management.yml @@ -17,72 +17,319 @@ dnac_version: "{{ dnac_version }}" dnac_debug: "{{ dnac_debug }}" dnac_log: True - dnac_log_level: DEBUG + dnac_log_level: "DEBUG" config_verify: True - - # - debug: - # msg: "{{ vars_map. }}" + dnac_api_task_timeout: "{{ dnac_api_task_timeout }}" + dnac_log_append: True ############################################# -# Clean Up # +# Add Devices # ############################################# - - name: Delete device + - name: Add new device cisco.dnac.inventory_workflow_manager: <<: *dnac_login - state: deleted + state: merged config: - "{{ item }}" - loop: "{{ vars_map.delete_devices }}" + loop: "{{ vars_map.device_details }}" + register: result_add_device ############################################# -# Add Devices # +# Pause # ############################################# - - name: Add new device - cisco.dnac.inventory_workflow_manager: + # - name: Pause + # pause: + # seconds: 30 + +############################################# +# Run Full Compliance # +############################################# + + - name: Run full complaince check using IP address list + cisco.dnac.network_compliance_workflow_manager: <<: *dnac_login - state: merged + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.run_complaince_iplist }}" + register: result_run_complaince + +# - name: Debug item +# debug: +# var: item +# loop: "{{ result_run_complaince.results }}" + +# - name: Assert Run full complaince check using IP address list +# assert: +# that: +# - item.changed == true +# - "'Run Compliance Check has completed successfully' in item.msg" +# loop: "{{ result_run_complaince.results }}" +# when: result_run_complaince is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Run Full Compliance # +############################################# + + - name: Run full Compliance check on device(s) using Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False config: - "{{ item }}" - loop: "{{ vars_map.device_details }}" - register: result_add_device + loop: "{{ vars_map.run_complaince_site }}" + register: result_run_complaince + +# - name: Debug item +# debug: +# var: item +# loop: "{{ result_run_complaince.results }}" + + - name: Assert Run Compliance check on device(s) using Site + assert: + that: + - item.changed == true + - "'Run Compliance Check has completed successfully' in item.msg" + loop: "{{ result_run_complaince.results }}" + when: result_run_complaince is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Run Full Compliance # +############################################# + + - name: Run Compliance check on device(s) using both IP address list and Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.run_compliance_iplist_site }}" + register: result_run_complaince + +# - name: Debug item +# debug: +# var: item +# loop: "{{ result_run_complaince.results }}" + + - name: Assert Run Compliance check on device(s) using both IP address list and Site + assert: + that: + - item.changed == true + - "'Run Compliance Check has completed successfully' in item.msg" + loop: "{{ result_run_complaince.results }}" + when: result_run_complaince is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Run Compliance with categories # +############################################# + + - name: Run Compliance check with specific categories on device(s) using IP address list + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.run_compliance_category_iplist }}" + register: result_run_complaince + +# - name: Debug item +# debug: +# var: item +# loop: "{{ result_run_complaince.results }}" + + - name: Assert Run Compliance check with specific categories on device(s) using IP address list + assert: + that: + - item.changed == true + - "'Run Compliance Check has completed successfully' in item.msg" + loop: "{{ result_run_complaince.results }}" + when: result_run_complaince is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Run Compliance with categories # +############################################# + + - name: Run Compliance check with specific categories on device(s) using Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.run_compliance_category_site }}" + register: result_run_complaince # - name: Debug item # debug: # var: item - # loop: "{{ result_add_device.results }}" + # loop: "{{ result_run_complaince.results }}" - - name: Assert device addition success + - name: Assert Run Compliance check with specific categories on device(s) using Site assert: that: - item.changed == true - - "'added to Cisco Catalyst Center' in item.msg" - loop: "{{ result_add_device.results }}" - when: result_add_device is defined + - "'Run Compliance Check has completed successfully' in item.msg" + loop: "{{ result_run_complaince.results }}" + when: result_run_complaince is defined ############################################# -# Run Full Compliance # +# Pause # ############################################# - - name: Pause for 60 seconds before updating interfaces + - name: Pause pause: - seconds: 60 + seconds: 10 ############################################# -# Run Full Compliance # +# Sync Device Config # +############################################# + + - name: Sync Device Configuration on device(s) using IP address list + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.sync_config_iplist }}" + register: result_sync_config + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_sync_config.results }}" + + # - name: Assert Sync Device Configuration on device(s) using IP address list + # assert: + # that: + # - item.changed == false + # - "'' in item.msg" + # loop: "{{ result_sync_config.results }}" + # when: result_sync_config is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Sync Device Config # +############################################# + + - name: Sync Device Configuration on device(s) using Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.sync_config_site }}" + register: result_sync_config + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_sync_config.results }}" + + # - name: Assert Sync Device Configuration on device(s) using IP address list + # assert: + # that: + # - item.changed == false + # - "'' in item.msg" + # loop: "{{ result_sync_config.results }}" + # when: result_sync_config is defined + +############################################# +# Pause # +############################################# + + - name: Pause + pause: + seconds: 10 + +############################################# +# Sync Device Config # +############################################# + + - name: Sync Device Configuration on device(s) using IP address list and Site + cisco.dnac.network_compliance_workflow_manager: + <<: *dnac_login + dnac_log_append: False + config: + - "{{ item }}" + loop: "{{ vars_map.sync_config_iplist_site }}" + register: result_sync_config + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_sync_config.results }}" + + # - name: Assert Sync Device Configuration on device(s) using IP address list + # assert: + # that: + # - item.changed == false + # - "'' in item.msg" + # loop: "{{ result_sync_config.results }}" + # when: result_sync_config is defined + + +############################################# +# Scale Run Compliance # ############################################# - - name: Run full complaince check on Site + - name: Scale Run complaince operation cisco.dnac.network_compliance_workflow_manager: <<: *dnac_login dnac_log_append: False - config: + config: - "{{ item }}" - loop: "{{ vars_map.run_complaince }}" - register: run_complaince + loop: "{{ vars_map.run_compliance_scale }}" + register: result_run_complaince - - name: Debug item - debug: - var: item - loop: "{{ run_complaince.results }}" +# - name: Debug item +# debug: +# var: item +# loop: "{{ result_run_complaince.results }}" + + - name: Assert Run full complaince check using IP address list + assert: + that: + - item.changed == true + - "'Run Compliance Check has completed successfully' in item.msg" + loop: "{{ result_run_complaince.results }}" + when: result_run_complaince is defined diff --git a/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml b/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml index 5dcf8968d0..7f6d1e1279 100644 --- a/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml +++ b/tests/integration/ccc_network_compliance_management/vars/vars_network_compliance_management.yml @@ -21,11 +21,43 @@ device_details: cli_transport: "ssh" netconf_port: 830 +run_complaince_iplist: + - ip_address_list: ['204.1.2.5'] -run_complaince: - - ip_address_list: ['204.1.2.5'] +run_complaince_site: + - site_name: "Global" +run_compliance_iplist_site: + - ip_address_list: ['204.1.2.5', '192.168.0.0'] + site_name: "Global" -delete_devices: - - ip_address_list: ["204.1.2.5"] - clean_config: False \ No newline at end of file +run_compliance_category_iplist: + - ip_address_list: ['204.1.2.5', '192.168.0.0'] + run_compliance_categories: ["INTENT", "RUNNING_CONFIG", "IMAGE", "PSIRT"] + +run_compliance_category_site: + - site_name: "Global" + run_compliance_categories: ["INTENT", "RUNNING_CONFIG", "IMAGE", "PSIRT"] + +run_compliance_false: + - ip_address_list: ['204.1.2.5', '192.168.0.0'] + run_compliance: False + +sync_config_iplist: + - ip_address_list: ['204.1.2.5', '192.168.0.0'] + sync_device_config: "True" + +sync_config_site: + - site_name: "Global" + sync_device_config: "True" + +sync_config_iplist_site: + - ip_address_list: ['204.1.2.5', '192.168.0.0'] + site_name: "Global" + sync_device_config: "True" + run_compliance: True + +run_compliance_scale: + - site_name: 'Global' + run_compliance_batch_size: 1 + run_compliance: True \ No newline at end of file diff --git a/tests/unit/modules/dnac/dnac_module.py b/tests/unit/modules/dnac/dnac_module.py index 2a2ee78ced..8dc3cce8bc 100644 --- a/tests/unit/modules/dnac/dnac_module.py +++ b/tests/unit/modules/dnac/dnac_module.py @@ -28,7 +28,6 @@ from ansible_collections.ansible.netcommon.tests.unit.modules.utils import ( set_module_args as _set_module_args, ) -from unittest.mock import patch def set_module_args(args): @@ -50,7 +49,7 @@ def loadPlaybookData(module_name): j_data = json.loads(data) except Exception as e: print(e) - pass + j_data = {} return j_data @@ -76,107 +75,9 @@ def load_fixture(module_name, name, device=""): class TestDnacModule(ModuleTestCase): - - def __init__(self, module): - - """ - Initialize an instance of class . - - Parameters: - - module (ModuleType): The Python module associated with this instance. - - Attributes: - - module (ModuleType): The provided module. - - test_data (dict): The loaded playbook data from the module. - - playbook_config (dict): The playbook configuration. - - playbook_config_missing_param (dict): The playbook configuration with missing parameters. - """ - - self.module = module - self.test_data = self.loadPlaybookData(str(self.module.__name__)) - self.playbook_config = self.test_data.get("playbook_config") - self.playbook_config_missing_param = self.test_data.get("playbook_config_missing_param") - - def setUp(self): - - """ - Set up the test environment by mocking Cisco DNA Center SDK initialization and execution. - This method is automatically called before each test case to ensure a clean and controlled environment. - Mocks the initialization and execution of the Cisco DNA Center SDK to isolate testing from actual SDK operations. - - Mocked attributes: - - mock_dnac_init: Mocks the initialization of the DNACSDK class. - - run_dnac_init: The started mock for DNACSDK initialization. - - mock_dnac_exec: Mocks the execution of DNACSDK methods. - - run_dnac_exec: The started mock for DNACSDK method execution. - """ - - self.mock_dnac_init = patch( - "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.__init__") - self.run_dnac_init = self.mock_dnac_init.start() - self.run_dnac_init.side_effect = [None] - self.mock_dnac_exec = patch( - "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.exec" - ) - self.run_dnac_exec = self.mock_dnac_exec.start() - - def tearDown(self): - - """ - Clean up the test environment by stopping the mocked Cisco DNA Center SDK initialization and execution. - This method is automatically called after each test case to clean up any resources or mocks created during testing. - Stops the mock instances of the Cisco DNA Center SDK initialization and execution. - """ - - self.mock_dnac_exec.stop() - self.mock_dnac_init.stop() - - def loadPlaybookData(self, module): - - """ - Load JSON data from a file. - - Parameters: - - module (str): The name of the module used to construct the filename. - - Returns: - - dict: The loaded JSON data. - - Raises: - - FileNotFoundError: If the file does not exist. - - json.JSONDecodeError: If there is an error decoding the JSON data. - """ - - file_path = os.path.join(fixture_path, "{0}.json".format(module)) - print(file_path) - try: - with open(file_path) as f: - data = f.read() - j_data = json.loads(data) - except Exception as e: - print(e) - pass - - return j_data - def execute_module_devices( self, failed=False, changed=False, response=None, sort=True, defaults=False ): - - """ - This method executes a module for a single device. - - Parameters: - - failed (bool, optional): If True, check for failures. Defaults to False. - - changed (bool, optional): If True, check for changes. Defaults to False. - - response (list, optional): The expected response data. Defaults to None. - - sort (bool, optional): If True, sort the response data before comparison. Defaults to True. - - device (str, optional): The device to execute the module on. Defaults to an empty string. - - Returns: - - dict: A dictionary containing the execution result. - """ - module_name = self.module.__name__.rsplit(".", 1)[1] local_fixture_path = os.path.join(fixture_path, module_name) @@ -200,22 +101,6 @@ def execute_module( self, failed=False, changed=False, response=None, sort=True, device="" ): - """ - Execute a module for a specific device and perform validation. - - This method executes the module for a specific device, performs validation checks, and returns the result. - - Parameters: - - failed (bool, optional): If True, check for failures. Defaults to False. - - changed (bool, optional): If True, check for changes. Defaults to False. - - response (list, optional): The expected response data. Defaults to None. - - sort (bool, optional): If True, sort the response data before comparison. Defaults to True. - - device (str, optional): The device to execute the module on. Defaults to an empty string. - - Returns: - - dict: A dictionary containing the execution result, including 'failed', 'changed', and 'response' keys. - """ - self.load_fixtures(response, device=device) if failed: @@ -236,14 +121,6 @@ def execute_module( return result def failed(self): - - """ - Check for failures during module execution. - - Returns: - - dict: A dictionary containing the failure status and additional information. - """ - with self.assertRaises(AnsibleFailJson) as exc: self.module.main() @@ -252,20 +129,12 @@ def failed(self): return result def changed(self, changed=False): - - """ - Check for changes during module execution. - - Parameters: - - changed (bool, optional): If True, check for changes. Defaults to False. - - Returns: - - dict: A dictionary containing the change status and additional information. - """ - with self.assertRaises(AnsibleExitJson) as exc: self.module.main() result = exc.exception.args[0] self.assertEqual(result["changed"], changed, result) return result + + def load_fixtures(self, response=None, device=""): + pass From c4117e010b307f9a59aadcc67f06e9dff1c5db33 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 19 Jul 2024 16:17:59 +0530 Subject: [PATCH 085/119] Update the documentation for the updation of device, it must be present in Catalyst Center. --- plugins/modules/inventory_intent.py | 4 +++- plugins/modules/inventory_workflow_manager.py | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index c8276b3381..fd25bc42e3 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -190,7 +190,9 @@ type: bool default: False credential_update: - description: Make this as true needed for the updation of device credentials and other device details. + description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter + is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the + update operations for the respective device(s). type: bool default: False clean_config: diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 9a077cea6d..664129beac 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -190,7 +190,9 @@ type: bool default: False credential_update: - description: Make this as true needed for the updation of device credentials and other device details. + description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter + is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the + update operations for the respective device(s). type: bool default: False clean_config: From 4278f5326703d501e8dfe2fcbf960a705c21e54f Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 19 Jul 2024 16:48:57 +0530 Subject: [PATCH 086/119] update the docstring for the module result if device is missing while updating the device credentials/details. --- plugins/modules/inventory_intent.py | 4 +++- plugins/modules/inventory_workflow_manager.py | 4 +++- 2 files changed, 6 insertions(+), 2 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index fd25bc42e3..d154ce0bf8 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -192,7 +192,9 @@ credential_update: description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the - update operations for the respective device(s). + update operations for the respective device(s). Otherwise if some devices are missing then module will try to add them in + Cisco Catalsyt Center and while adding if some required parameter is missing then module will failed and stop the execution + and we cannot perform the update operation for the devices that are already there. type: bool default: False clean_config: diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 664129beac..c66242f589 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -192,7 +192,9 @@ credential_update: description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the - update operations for the respective device(s). + update operations for the respective device(s). Otherwise if some devices are missing then module will try to add them in + Cisco Catalsyt Center and while adding if some required parameter is missing then module will failed and stop the execution + and we cannot perform the update operation for the devices that are already there. type: bool default: False clean_config: From 98961958bbfcda96a9f9650524e69a4830ace967 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Mon, 22 Jul 2024 10:12:45 +0530 Subject: [PATCH 087/119] Update the review comments --- plugins/modules/inventory_intent.py | 10 +++++----- plugins/modules/inventory_workflow_manager.py | 10 +++++----- 2 files changed, 10 insertions(+), 10 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index d154ce0bf8..507bb2d477 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -190,11 +190,11 @@ type: bool default: False credential_update: - description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter - is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the - update operations for the respective device(s). Otherwise if some devices are missing then module will try to add them in - Cisco Catalsyt Center and while adding if some required parameter is missing then module will failed and stop the execution - and we cannot perform the update operation for the devices that are already there. + description: Set this to 'True' to update device credentials and other device details. When this parameter is 'True', ensure that + the devices are present in Cisco Catalyst Center; only then can update operations be performed on the respective devices. + If the parameter is 'True' and any device is not present, the module will attempt to add it. If required parameters are + missing during this addition, the module will fail and stop execution, preventing update operations for devices that are + already present. type: bool default: False clean_config: diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index c66242f589..b423eac21c 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -190,11 +190,11 @@ type: bool default: False credential_update: - description: Make this as true needed for the updation of device credentials and other device details. Also if this parameter - is set to True then make sure that the device(s) must be present in Cisco Catalyst Center then only we can perform the - update operations for the respective device(s). Otherwise if some devices are missing then module will try to add them in - Cisco Catalsyt Center and while adding if some required parameter is missing then module will failed and stop the execution - and we cannot perform the update operation for the devices that are already there. + description: Set this to 'True' to update device credentials and other device details. When this parameter is 'True', ensure that + the devices are present in Cisco Catalyst Center; only then can update operations be performed on the respective devices. + If the parameter is 'True' and any device is not present, the module will attempt to add it. If required parameters are + missing during this addition, the module will fail and stop execution, preventing update operations for devices that are + already present. type: bool default: False clean_config: From 39c1bb08fc55ac5bbc1f3606c23030173381479d Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 22 Jul 2024 19:02:17 -0700 Subject: [PATCH 088/119] UTs & minor changes - Network Compliance module --- .../network_compliance_workflow_manager.py | 22 +- .../network_compliance_workflow_manager.json | 4413 +++++++++++++++++ ...est_network_compliance_workflow_manager.py | 846 ++++ 3 files changed, 5271 insertions(+), 10 deletions(-) create mode 100644 tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json create mode 100644 tests/unit/modules/dnac/test_network_compliance_workflow_manager.py diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index 4fff1b6a83..dbe79b5a57 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -473,6 +473,7 @@ def validate_run_compliance_paramters(self, mgmt_ip_to_instance_id_map, run_comp device_in_progress = set() response = self.get_compliance_report(run_compliance_params, mgmt_ip_to_instance_id_map) + if not response: ip_address_list_str = ", ".join(list(mgmt_ip_to_instance_id_map.keys())) msg = ( @@ -725,7 +726,7 @@ def is_sync_required(self, response, mgmt_ip_to_instance_id_map): """ task_name = "Sync Device Configuration" required = True - msg = "" + msg = None # Validate if sync is required self.log("Compliance Report for {0} operation for device(s) {1} : {2}".format( @@ -973,16 +974,17 @@ def get_compliance_details_of_device(self, compliance_details_of_device_params, self.log("Response received post 'compliance_details_of_device' API call: {0}".format(str(response)), "DEBUG") if response: - response = response.response + response = response["response"] else: self.log("No response received from the 'compliance_details_of_device' API call.", "ERROR") return response except Exception as e: # Handle any exceptions that occur during the API call - msg = ("An error occurred while retrieving Compliance Details for device:{0} using 'compliance_details_of_device' API call" + self.msg = ("An error occurred while retrieving Compliance Details for device:{0} using 'compliance_details_of_device' API call" ". Error: {1}".format(device_ip, str(e))) - self.log(msg, "ERROR") - return None + #self.log(msg, "ERROR") + self.update_result("failed", False, self.msg, "ERROR") + self.check_return_status() def run_compliance(self, run_compliance_params, batch_size): """ @@ -1028,7 +1030,7 @@ def run_compliance(self, run_compliance_params, batch_size): if response: self.result.update(dict(response=response["response"])) - task_id = response.response.get("taskId") + task_id = response["response"].get("taskId") self.log("Task Id for the 'run_compliance' task is {0}".format(task_id), "DEBUG") if task_id: batches_dict[idx] = {"task_id": task_id, "batch_params": batch_params} @@ -1069,9 +1071,9 @@ def sync_device_config(self, sync_device_config_params): if response: self.result.update(dict(response=response["response"])) - self.log("Task Id for the 'commit_device_configuration' task is {0}".format(response.response.get("taskId")), "INFO") + self.log("Task Id for the 'commit_device_configuration' task is {0}".format(response["response"].get("taskId")), "INFO") # Return the task ID - return response.response.get("taskId") + return response["response"].get("taskId") else: self.log("No response received from the 'commit_device_configuration' API call.", "ERROR") return None @@ -1108,7 +1110,7 @@ def get_task_status(self, task_id, task_name): "is {2}".format(task_name, str(task_id), str(response)), "DEBUG") if response: - response = response.response + response = response["response"] else: self.log("No response received from the 'get_task_by_id' API call.", "CRITICAL") return response @@ -1142,7 +1144,7 @@ def get_task_tree(self, task_id, task_name): self.log("Response received post 'get_task_tree' API call for the Task {0} with Task id {1} " "is {2}".format(task_name, str(task_id), str(response)), "DEBUG") if response: - response = response.response + response = response["response"] else: self.log("No response received from the 'get_task_tree' API call.", "CRITICAL") return response diff --git a/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json b/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json new file mode 100644 index 0000000000..3ec955a584 --- /dev/null +++ b/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json @@ -0,0 +1,4413 @@ +{ + "playbook_config_run_compliance_iplist":[ + { + "ip_address_list":[ + "192.168.0.0" + ] + } + ], + "playbook_config_run_compliance_site":[ + { + "site_name":"Global" + } + ], + "playbook_config_run_compliance_iplist_site":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "site_name":"Global" + } + ], + "playbook_config_run_compliance_categories_iplist":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "run_compliance_categories":[ + "INTENT", + "RUNNING_CONFIG", + "IMAGE", + "PSIRT" + ] + } + ], + "playbook_config_run_compliance_scale_iplist":[ + { + "ip_address_list":[ + "192.168.0.0", + "192.168.0.1" + ], + "run_compliance_batch_size":1 + } + ], + "playbook_config_sync_device_config_iplist":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "run_compliance":"False", + "sync_device_config":"True" + } + ], + "playbook_config_sync_device_config_site":[ + { + "site_name":"Global", + "run_compliance":"False", + "sync_device_config":"True" + } + ], + "playbook_config_sync_device_config_iplist_site":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "site_name":"Global", + "run_compliance":"False", + "sync_device_config":"True" + } + ], + "playbook_config_sync_device_config_iplist_site_nr":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "site_name":"Global", + "run_compliance":"False", + "sync_device_config":"True" + } + ], + "playbook_config_run_compliance_false":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "run_compliance":"False" + } + ], + "playbook_config_all_tasks_false":[ + { + "ip_address_list":[ + "192.168.0.0" + ], + "run_compliance":"False", + "sync_device_config":"False" + } + ], + "response_get_device_list_success":{ + "response":[ + { + "reachabilityStatus":"Reachable", + "family":"Switches and Hubs", + "managementIpAddress":"192.168.0.0", + "instanceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "id":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + } + ] + }, + "response_get_site_success":{ + "response":[ + { + "additionalInfo":[ + + ], + "name":"Global", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "siteHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "siteNameHierarchy":"Global" + } + ] + }, + "response_get_membership_success":{ + "site":{ + "response":[ + { + "parentId":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "address":"Tokyo, Japan", + "addressInheritedFrom":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", + "type":"floor" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "anchorWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "tertiaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "primaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80143381-187c-48fa-a356-15389aad4e9c/9674054e-fd9e-49ed-8084-1ce9131d6781/0c0aef1d-0ab9-4660-b216-649c4fe2b7a7/c9c21b46-5956-4e6e-9dbf-49f3e6e55a66", + "groupNameHierarchy":"Global/Japan/Tokyo/Ansible_Tower/Ansible_Floor", + "name":"Ansible_Floor", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"c9c21b46-5956-4e6e-9dbf-49f3e6e55a66" + }, + { + "parentId":"9674054e-fd9e-49ed-8084-1ce9131d6781", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "anchorWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "tertiaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "primaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"Japan", + "address":"Tokyo, Japan", + "latitude":"35.6764", + "addressInheritedFrom":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", + "type":"building", + "longitude":"139.65" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80143381-187c-48fa-a356-15389aad4e9c/9674054e-fd9e-49ed-8084-1ce9131d6781/0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", + "groupNameHierarchy":"Global/Japan/Tokyo/Ansible_Tower", + "name":"Ansible_Tower", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7" + }, + { + "parentId":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"2", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "anchorWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "tertiaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "primaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/bf561bf3-95d6-4da1-bf49-26887955fa2e/eda30e7b-0e67-4879-85bd-cfc30b0d9765", + "groupNameHierarchy":"Global/India/Bangalore", + "name":"Bangalore", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"eda30e7b-0e67-4879-85bd-cfc30b0d9765" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/16244588-f6da-4ef7-b329-87eed13902be", + "groupNameHierarchy":"Global/USA/BayAreaGuest", + "name":"BayAreaGuest", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"16244588-f6da-4ef7-b329-87eed13902be" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/a83421d0-cfe5-4318-85ee-a991d2cdd748", + "groupNameHierarchy":"Global/USA/BERKELEY", + "name":"BERKELEY", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"a83421d0-cfe5-4318-85ee-a991d2cdd748" + }, + { + "parentId":"3fbfb158-a429-41b3-a220-6a6286f93d16", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"Ev Chargers Bldg 10, 7200-10 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "latitude":"35.85992111421487", + "addressInheritedFrom":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "type":"building", + "longitude":"-78.8829258991226" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"3", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "groupNameHierarchy":"Global/USA/RTP/BLD10", + "name":"BLD10", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"dca266ec-80d9-4692-8782-1f1d3d7aed0a" + }, + { + "parentId":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Ev Chargers Bldg 10, 7200-10 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "type":"floor" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/dca266ec-80d9-4692-8782-1f1d3d7aed0a/0d64a127-ae63-46f8-9b76-9d7d1502c6d4", + "groupNameHierarchy":"Global/USA/RTP/BLD10/BLD10_FLOOR1", + "name":"BLD10_FLOOR1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"0d64a127-ae63-46f8-9b76-9d7d1502c6d4" + }, + { + "parentId":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Ev Chargers Bldg 10, 7200-10 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "type":"floor" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/dca266ec-80d9-4692-8782-1f1d3d7aed0a/f5c31c72-6d56-456b-aefb-d7cc942e5b04", + "groupNameHierarchy":"Global/USA/RTP/BLD10/BLD10_FLOOR2", + "name":"BLD10_FLOOR2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"f5c31c72-6d56-456b-aefb-d7cc942e5b04" + }, + { + "parentId":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Ev Chargers Bldg 10, 7200-10 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "type":"floor" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/dca266ec-80d9-4692-8782-1f1d3d7aed0a/67966786-b701-4099-8e1a-4191534f36d2", + "groupNameHierarchy":"Global/USA/RTP/BLD10/BLD10_FLOOR3", + "name":"BLD10_FLOOR3", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"67966786-b701-4099-8e1a-4191534f36d2" + }, + { + "parentId":"3fbfb158-a429-41b3-a220-6a6286f93d16", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"Cisco Systems, 7200 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "latitude":"35.86059627310624", + "addressInheritedFrom":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "type":"building", + "longitude":"-78.88105620286412" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"3", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/89b128e0-3217-4f63-bf99-b202ec7c0103", + "groupNameHierarchy":"Global/USA/RTP/BLD11", + "name":"BLD11", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"89b128e0-3217-4f63-bf99-b202ec7c0103" + }, + { + "parentId":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "type":"floor" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/89b128e0-3217-4f63-bf99-b202ec7c0103/16b5e550-d288-4e11-94a6-baaa8e3d9c08", + "groupNameHierarchy":"Global/USA/RTP/BLD11/BLD11_FLOOR1", + "name":"BLD11_FLOOR1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"16b5e550-d288-4e11-94a6-baaa8e3d9c08" + }, + { + "parentId":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "type":"floor" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/89b128e0-3217-4f63-bf99-b202ec7c0103/8c57bcf3-b0e4-4f47-b45e-bbb9f32e2997", + "groupNameHierarchy":"Global/USA/RTP/BLD11/BLD11_FLOOR2", + "name":"BLD11_FLOOR2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"8c57bcf3-b0e4-4f47-b45e-bbb9f32e2997" + }, + { + "parentId":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "type":"floor" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/89b128e0-3217-4f63-bf99-b202ec7c0103/be5fd8eb-dda4-4f38-b5ce-35d1d49151cc", + "groupNameHierarchy":"Global/USA/RTP/BLD11/BLD11_FLOOR3", + "name":"BLD11_FLOOR3", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"be5fd8eb-dda4-4f38-b5ce-35d1d49151cc" + }, + { + "parentId":"3fbfb158-a429-41b3-a220-6a6286f93d16", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"3", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "latitude":"35.8611847591779", + "addressInheritedFrom":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "type":"building", + "longitude":"-78.88217248318003" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/4996f8ef-8933-412e-b58b-2238ba860ec7", + "groupNameHierarchy":"Global/USA/RTP/BLD12", + "name":"BLD12", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"4996f8ef-8933-412e-b58b-2238ba860ec7" + }, + { + "parentId":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "type":"floor" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/4996f8ef-8933-412e-b58b-2238ba860ec7/d44f3eca-a3dc-4ed1-a020-0ded43c78056", + "groupNameHierarchy":"Global/USA/RTP/BLD12/BLD12_FLOOR1", + "name":"BLD12_FLOOR1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"d44f3eca-a3dc-4ed1-a020-0ded43c78056" + }, + { + "parentId":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "type":"floor" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/4996f8ef-8933-412e-b58b-2238ba860ec7/fb5bbd30-3a01-4eaf-a24d-b0e75ff158c6", + "groupNameHierarchy":"Global/USA/RTP/BLD12/BLD12_FLOOR2", + "name":"BLD12_FLOOR2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"fb5bbd30-3a01-4eaf-a24d-b0e75ff158c6" + }, + { + "parentId":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"Cisco Systems, 7200-12 Kit Creek Rd, Morrisville, North Carolina 27560, United States", + "addressInheritedFrom":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "type":"floor" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16/4996f8ef-8933-412e-b58b-2238ba860ec7/ea574cd8-fa45-48ab-9944-83ed33537416", + "groupNameHierarchy":"Global/USA/RTP/BLD12/BLD12_FLOOR3", + "name":"BLD12_FLOOR3", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"ea574cd8-fa45-48ab-9944-83ed33537416" + }, + { + "parentId":"65eba291-ee04-43d2-bddb-a2cb2e7ff7d8", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"725 Alder Drive, Milpitas, California 95035, United States", + "latitude":"37.415947", + "addressInheritedFrom":"ed089cbf-3622-492f-bf60-5baf6d0b3708", + "type":"building", + "longitude":"-121.916327" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/ed089cbf-3622-492f-bf60-5baf6d0b3708", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD20", + "name":"BLD20", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"ed089cbf-3622-492f-bf60-5baf6d0b3708" + }, + { + "parentId":"ed089cbf-3622-492f-bf60-5baf6d0b3708", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"725 Alder Drive, Milpitas, California 95035, United States", + "addressInheritedFrom":"ed089cbf-3622-492f-bf60-5baf6d0b3708", + "type":"floor" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/ed089cbf-3622-492f-bf60-5baf6d0b3708/47a127ae-92bd-49ec-aed0-aec8e2a31678", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD20/BLD20_FLOOR1", + "name":"BLD20_FLOOR1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"47a127ae-92bd-49ec-aed0-aec8e2a31678" + }, + { + "parentId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"floor" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6/625bcb2d-4e4a-4571-80e9-c5d2caad4ecf", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23/BLD20_FLOOR2", + "name":"BLD20_FLOOR2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"625bcb2d-4e4a-4571-80e9-c5d2caad4ecf" + }, + { + "parentId":"65eba291-ee04-43d2-bddb-a2cb2e7ff7d8", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"5", + "hasChild":"TRUE", + "group.count.direct":"5", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "latitude":"37.398188", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"building", + "longitude":"-121.912974" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23", + "name":"BLD23", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"36d3230c-c6ce-44ae-8901-3b4a624883e6" + }, + { + "parentId":"a83421d0-cfe5-4318-85ee-a991d2cdd748", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"725 Alder Drive, Milpitas, California 95035, United States", + "latitude":"37.415947", + "addressInheritedFrom":"8ff6aa1d-089f-41e2-8e42-5cad97770e7d", + "type":"building", + "longitude":"-121.916327" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/a83421d0-cfe5-4318-85ee-a991d2cdd748/8ff6aa1d-089f-41e2-8e42-5cad97770e7d", + "groupNameHierarchy":"Global/USA/BERKELEY/BLDBERK", + "name":"BLDBERK", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"8ff6aa1d-089f-41e2-8e42-5cad97770e7d" + }, + { + "parentId":"16244588-f6da-4ef7-b329-87eed13902be", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"725 Alder Drive, Milpitas, California 95035, United States", + "latitude":"37.415947", + "addressInheritedFrom":"fa666989-76fb-4aa1-8caf-ad9dc6d08ef7", + "type":"building", + "longitude":"-121.916327" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/16244588-f6da-4ef7-b329-87eed13902be/fa666989-76fb-4aa1-8caf-ad9dc6d08ef7", + "groupNameHierarchy":"Global/USA/BayAreaGuest/BLD_GB", + "name":"BLD_GB", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"fa666989-76fb-4aa1-8caf-ad9dc6d08ef7" + }, + { + "parentId":"21cc7dad-8c9e-4637-8f24-22ec417b9811", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"UMBRELLA", + "attributes":{ + "umbrellaReady":"true", + "member.umbrellaNotReady.direct":"0", + "member.umbrellaReady.direct":"1", + "member.umbrellaReadyNotEnabled.direct":"1", + "member.umbrellaEnabled.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "latitude":"37.398188", + "addressInheritedFrom":"274da223-2411-4689-8f70-b5bbd8915020", + "type":"building", + "longitude":"-121.912974" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"3", + "group.hierarchy.groupType":"SITE", + "member.count.total":"3", + "member.count.direct":"1" + } + }, + { + "nameSpace":"ETA", + "attributes":{ + "member.compatibleWithNaasOnly.direct":"0", + "member.etaCapable.direct":"1", + "member.etaReady.direct":"1", + "member.etaEnabledNaasOnly.direct":"0", + "ETAReady":"true", + "member.etaNotReady.direct":"0", + "member.etaReadyNotEnabled.direct":"1", + "member.etaEnabled.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/21cc7dad-8c9e-4637-8f24-22ec417b9811/274da223-2411-4689-8f70-b5bbd8915020", + "groupNameHierarchy":"Global/USA/New York/BLDNYC", + "name":"BLDNYC", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"274da223-2411-4689-8f70-b5bbd8915020" + }, + { + "parentId":"4a03cd04-41bb-4e3c-9a59-3f96637c27e7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "latitude":"37.398188", + "addressInheritedFrom":"b497a0ab-3ab4-42fd-8921-2f45af587b98", + "type":"building", + "longitude":"-121.912974" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/4a03cd04-41bb-4e3c-9a59-3f96637c27e7/b497a0ab-3ab4-42fd-8921-2f45af587b98", + "groupNameHierarchy":"Global/USA/SAN-FRANCISCO/BLD_SF", + "name":"BLD_SF", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"b497a0ab-3ab4-42fd-8921-2f45af587b98" + }, + { + "parentId":"4a03cd04-41bb-4e3c-9a59-3f96637c27e7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "latitude":"37.398188", + "addressInheritedFrom":"ef6944e0-72be-4d1d-8e29-1ca1ebcf8d98", + "type":"building", + "longitude":"-121.912974" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/4a03cd04-41bb-4e3c-9a59-3f96637c27e7/ef6944e0-72be-4d1d-8e29-1ca1ebcf8d98", + "groupNameHierarchy":"Global/USA/SAN-FRANCISCO/BLD_SF1", + "name":"BLD_SF1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"ef6944e0-72be-4d1d-8e29-1ca1ebcf8d98" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "anchorWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "tertiaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "primaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"2", + "hasChild":"TRUE", + "group.count.direct":"2", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "type":"area" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "groupNameHierarchy":"Global/Chennai", + "name":"Chennai", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"80be6b3f-2bb8-4711-ae59-f7a667eedb08" + }, + { + "parentId":"6f4d01b1-d00c-4471-8aa2-28b7e99636ab", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"1579 Hopkins Drive, San Jose, California 95122, United States", + "latitude":"37.338", + "addressInheritedFrom":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7", + "type":"building", + "longitude":"-121.832" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/6f4d01b1-d00c-4471-8aa2-28b7e99636ab/7010b0ed-ae2b-41bd-977a-79b1628dd1b7", + "groupNameHierarchy":"Global/USA/Georgia/cisco", + "name":"cisco", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"94f61603-5f1f-4b26-85dd-59355cd67632", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"94f61603-5f1f-4b26-85dd-59355cd67632", + "anchorWlcInheritedFrom":"94f61603-5f1f-4b26-85dd-59355cd67632", + "tertiaryWlcInheritedFrom":"94f61603-5f1f-4b26-85dd-59355cd67632", + "primaryWlcInheritedFrom":"94f61603-5f1f-4b26-85dd-59355cd67632" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/94f61603-5f1f-4b26-85dd-59355cd67632", + "groupNameHierarchy":"Global/Demo4", + "name":"Demo4", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"94f61603-5f1f-4b26-85dd-59355cd67632" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"633a40de-b885-448c-bd84-dd1fef679fbe", + "anchorWlcInheritedFrom":"633a40de-b885-448c-bd84-dd1fef679fbe", + "tertiaryWlcInheritedFrom":"633a40de-b885-448c-bd84-dd1fef679fbe", + "primaryWlcInheritedFrom":"633a40de-b885-448c-bd84-dd1fef679fbe" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"633a40de-b885-448c-bd84-dd1fef679fbe", + "type":"area" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/633a40de-b885-448c-bd84-dd1fef679fbe", + "groupNameHierarchy":"Global/Demo5", + "name":"Demo5", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"633a40de-b885-448c-bd84-dd1fef679fbe" + }, + { + "parentId":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "width":"200.0", + "length":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "anchorWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "tertiaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "primaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"None", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"India", + "address":"Bengaluru, Karnataka, India", + "latitude":"0.0", + "addressInheritedFrom":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763", + "type":"floor", + "longitude":"0.0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/bf561bf3-95d6-4da1-bf49-26887955fa2e/eda30e7b-0e67-4879-85bd-cfc30b0d9765/caa9eb0d-618b-4d90-ac10-eb2a2d17e763/e3c898bc-a0d5-47b9-83c6-a48a88fa6fbe", + "groupNameHierarchy":"Global/India/Bangalore/Mantri Square/floor1", + "name":"floor1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"e3c898bc-a0d5-47b9-83c6-a48a88fa6fbe" + }, + { + "parentId":"274da223-2411-4689-8f70-b5bbd8915020", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"17301034-7715-4363-952f-3d290ea6ca59", + "primaryWlc":"778a27bb-d795-4fa3-a321-f2e693ebe1f4" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"2", + "member.count.direct":"2" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"UMBRELLA", + "attributes":{ + "umbrellaReady":"true", + "member.umbrellaNotReady.direct":"0", + "member.umbrellaReady.direct":"1", + "member.umbrellaReadyNotEnabled.direct":"1", + "member.umbrellaEnabled.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"274da223-2411-4689-8f70-b5bbd8915020", + "type":"floor" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/21cc7dad-8c9e-4637-8f24-22ec417b9811/274da223-2411-4689-8f70-b5bbd8915020/17301034-7715-4363-952f-3d290ea6ca59", + "groupNameHierarchy":"Global/USA/New York/BLDNYC/FLOOR1", + "name":"FLOOR1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"17301034-7715-4363-952f-3d290ea6ca59" + }, + { + "parentId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"floor" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6/8a7ddd03-dddb-4a76-a079-56c3b45ab1ec", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23/FLOOR1_LEVEL1", + "name":"FLOOR1_LEVEL1", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"8a7ddd03-dddb-4a76-a079-56c3b45ab1ec" + }, + { + "parentId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"floor" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6/c45259ff-0612-4fe7-907c-5987877892d9", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23/FLOOR1_LEVEL2", + "name":"FLOOR1_LEVEL2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"c45259ff-0612-4fe7-907c-5987877892d9" + }, + { + "parentId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"floor" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6/eb935311-f082-416e-a13c-08acdc6219c0", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23/FLOOR1_LEVEL3", + "name":"FLOOR1_LEVEL3", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"eb935311-f082-416e-a13c-08acdc6219c0" + }, + { + "parentId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "type":"floor" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8/36d3230c-c6ce-44ae-8901-3b4a624883e6/78b8a15c-c112-4941-b00b-ceda2edb38f2", + "groupNameHierarchy":"Global/USA/SAN JOSE/BLD23/FLOOR1_LEVEL4", + "name":"FLOOR1_LEVEL4", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"78b8a15c-c112-4941-b00b-ceda2edb38f2" + }, + { + "parentId":"274da223-2411-4689-8f70-b5bbd8915020", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"212be018-cfb6-4041-9caa-d344385848b7", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "secondaryWlc":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "addressInheritedFrom":"274da223-2411-4689-8f70-b5bbd8915020", + "type":"floor" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/21cc7dad-8c9e-4637-8f24-22ec417b9811/274da223-2411-4689-8f70-b5bbd8915020/212be018-cfb6-4041-9caa-d344385848b7", + "groupNameHierarchy":"Global/USA/New York/BLDNYC/FLOOR2", + "name":"FLOOR2", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"212be018-cfb6-4041-9caa-d344385848b7" + }, + { + "parentId":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "address":"1579 Hopkins Drive, San Jose, California 95122, United States", + "addressInheritedFrom":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7", + "type":"floor" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"None", + "isCadFile":"false", + "floorIndex":"1" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "length":"100.0", + "width":"100.0", + "height":"10.0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/6f4d01b1-d00c-4471-8aa2-28b7e99636ab/7010b0ed-ae2b-41bd-977a-79b1628dd1b7/5e6d602a-4135-44ef-a5ae-8d9ee6056f3b", + "groupNameHierarchy":"Global/USA/Georgia/cisco/Floor_test", + "name":"Floor_test", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"5e6d602a-4135-44ef-a5ae-8d9ee6056f3b" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"2", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/6f4d01b1-d00c-4471-8aa2-28b7e99636ab", + "groupNameHierarchy":"Global/USA/Georgia", + "name":"Georgia", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"6f4d01b1-d00c-4471-8aa2-28b7e99636ab" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "anchorWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "tertiaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "primaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "type":"area" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/bf561bf3-95d6-4da1-bf49-26887955fa2e", + "groupNameHierarchy":"Global/India", + "name":"India", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"bf561bf3-95d6-4da1-bf49-26887955fa2e" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "anchorWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "tertiaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "primaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"3", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "type":"area" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80143381-187c-48fa-a356-15389aad4e9c", + "groupNameHierarchy":"Global/Japan", + "name":"Japan", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"80143381-187c-48fa-a356-15389aad4e9c" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"Bengaluru, Karnataka, India", + "latitude":"25.2", + "addressInheritedFrom":"d0484233-604a-4972-b010-42a0d44fe3d6", + "type":"building", + "longitude":"42.1" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"d0484233-604a-4972-b010-42a0d44fe3d6", + "anchorWlcInheritedFrom":"d0484233-604a-4972-b010-42a0d44fe3d6", + "tertiaryWlcInheritedFrom":"d0484233-604a-4972-b010-42a0d44fe3d6", + "primaryWlcInheritedFrom":"d0484233-604a-4972-b010-42a0d44fe3d6" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/d0484233-604a-4972-b010-42a0d44fe3d6", + "groupNameHierarchy":"Global/JJJ", + "name":"JJJ", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"d0484233-604a-4972-b010-42a0d44fe3d6" + }, + { + "parentId":"eda30e7b-0e67-4879-85bd-cfc30b0d9765", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"India", + "address":"Bengaluru, Karnataka, India", + "latitude":"12.969910", + "addressInheritedFrom":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763", + "type":"building", + "longitude":"77.597960" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"1", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "anchorWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "tertiaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "primaryWlcInheritedFrom":"bf561bf3-95d6-4da1-bf49-26887955fa2e" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/bf561bf3-95d6-4da1-bf49-26887955fa2e/eda30e7b-0e67-4879-85bd-cfc30b0d9765/caa9eb0d-618b-4d90-ac10-eb2a2d17e763", + "groupNameHierarchy":"Global/India/Bangalore/Mantri Square", + "name":"Mantri Square", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"4", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"3", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/21cc7dad-8c9e-4637-8f24-22ec417b9811", + "groupNameHierarchy":"Global/USA/New York", + "name":"New York", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"21cc7dad-8c9e-4637-8f24-22ec417b9811" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"12", + "hasChild":"TRUE", + "group.count.direct":"3", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/3fbfb158-a429-41b3-a220-6a6286f93d16", + "groupNameHierarchy":"Global/USA/RTP", + "name":"RTP", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"3fbfb158-a429-41b3-a220-6a6286f93d16" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/7002e28c-a309-454b-ac5d-a6a99d64bc20", + "groupNameHierarchy":"Global/USA/Sample", + "name":"Sample", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"7002e28c-a309-454b-ac5d-a6a99d64bc20" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"2", + "hasChild":"TRUE", + "group.count.direct":"2", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/4a03cd04-41bb-4e3c-9a59-3f96637c27e7", + "groupNameHierarchy":"Global/USA/SAN-FRANCISCO", + "name":"SAN-FRANCISCO", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"4a03cd04-41bb-4e3c-9a59-3f96637c27e7" + }, + { + "parentId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"8", + "hasChild":"TRUE", + "group.count.direct":"2", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/65eba291-ee04-43d2-bddb-a2cb2e7ff7d8", + "groupNameHierarchy":"Global/USA/SAN JOSE", + "name":"SAN JOSE", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"65eba291-ee04-43d2-bddb-a2cb2e7ff7d8" + }, + { + "parentId":"274da223-2411-4689-8f70-b5bbd8915020", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"mapGeometry", + "attributes":{ + "offsetX":"0.0", + "offsetY":"0.0", + "width":"58.1", + "length":"103.23", + "height":"58.22" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "country":"United States", + "address":"McCarthy Blvd, San Jose, California 95131, United States", + "latitude":"0.0", + "addressInheritedFrom":"274da223-2411-4689-8f70-b5bbd8915020", + "type":"floor", + "longitude":"0.0" + } + }, + { + "nameSpace":"mapsSummary", + "attributes":{ + "rfModel":"101101", + "imageURL":"None", + "isCadFile":"false", + "floorIndex":"1" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67/21cc7dad-8c9e-4637-8f24-22ec417b9811/274da223-2411-4689-8f70-b5bbd8915020/398f4d42-d265-4233-8ec3-5e4ba73c9956", + "groupNameHierarchy":"Global/USA/New York/BLDNYC/Test_Floor3", + "name":"Test_Floor3", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"398f4d42-d265-4233-8ec3-5e4ba73c9956" + }, + { + "parentId":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"India", + "latitude":"12", + "addressInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "type":"building", + "longitude":"80" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "anchorWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "tertiaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "primaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80be6b3f-2bb8-4711-ae59-f7a667eedb08/0e238b6e-e390-4dae-8932-49ceb3376304", + "groupNameHierarchy":"Global/Chennai/Tidel", + "name":"Tidel", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"0e238b6e-e390-4dae-8932-49ceb3376304" + }, + { + "parentId":"80143381-187c-48fa-a356-15389aad4e9c", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "type":"area" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "anchorWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "tertiaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c", + "primaryWlcInheritedFrom":"80143381-187c-48fa-a356-15389aad4e9c" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"2", + "hasChild":"TRUE", + "group.count.direct":"1", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80143381-187c-48fa-a356-15389aad4e9c/9674054e-fd9e-49ed-8084-1ce9131d6781", + "groupNameHierarchy":"Global/Japan/Tokyo", + "name":"Tokyo", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"9674054e-fd9e-49ed-8084-1ce9131d6781" + }, + { + "parentId":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"Location", + "attributes":{ + "country":"India", + "address":"Cognizant Technology Solutions, Chennai, Tamil Nadu 600113, India", + "latitude":"12.9908", + "addressInheritedFrom":"05d2d29c-3c23-478e-88ee-7ec60398634f", + "type":"building", + "longitude":"80.2470" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"0", + "hasChild":"FALSE", + "group.count.direct":"0", + "group.hierarchy.groupType":"SITE", + "member.count.total":"0", + "member.count.direct":"0" + } + }, + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "anchorWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "tertiaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "primaryWlcInheritedFrom":"80be6b3f-2bb8-4711-ae59-f7a667eedb08" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/80be6b3f-2bb8-4711-ae59-f7a667eedb08/05d2d29c-3c23-478e-88ee-7ec60398634f", + "groupNameHierarchy":"Global/Chennai/Trill", + "name":"Trill", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"05d2d29c-3c23-478e-88ee-7ec60398634f" + }, + { + "parentId":"3cf15665-7b7b-4b29-82a9-75b8d094b602", + "groupTypeList":[ + "SITE" + ], + "additionalInfo":[ + { + "nameSpace":"com.wireless.managingwlc", + "attributes":{ + "secondaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "anchorWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "tertiaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "primaryWlcInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + }, + { + "nameSpace":"Location", + "attributes":{ + "addressInheritedFrom":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "type":"area" + } + }, + { + "nameSpace":"System Settings", + "attributes":{ + "group.count.total":"38", + "hasChild":"TRUE", + "group.count.direct":"8", + "group.hierarchy.groupType":"SITE", + "member.count.total":"3", + "member.count.direct":"0" + } + } + ], + "groupHierarchy":"3cf15665-7b7b-4b29-82a9-75b8d094b602/69f31d51-9e0d-48f4-8546-4935253f9a67", + "groupNameHierarchy":"Global/USA", + "name":"USA", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"69f31d51-9e0d-48f4-8546-4935253f9a67" + } + ], + "version":"1.0" + }, + "device":[ + { + "response":[ + { + "instanceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-27 02:32:55", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"Managed", + "description":"Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 17.14.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2024 by Cisco Systems, Inc. Compiled Fri 05-Apr-24 00:08 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.1", + "family":"Switches and Hubs", + "hostname":"DC-FR-9300.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 17:40:01", + "lastUpdateTime":1721324455437, + "lastUpdated":"2024-07-18 17:40:55", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"d4:ad:bd:c1:67:00", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.1", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204.192. 3. 40", + "pendingSyncRequestsCount":"0", + "platformId":"C9300-24U", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FJC2327U0S2", + "series":"Cisco Catalyst 9300 Series Switches", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.14.1", + "tagCount":"0", + "type":"Cisco Catalyst 9300 Switch", + "upTime":"52 days, 15:08:19.76", + "uptimeSeconds":4552059, + "vendor":"Cisco" + }, + { + "instanceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-27 02:34:15", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"In Progress", + "description":"Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 17.14.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2024 by Cisco Systems, Inc. Compiled Fri 05-Apr-24 00:08 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.0", + "family":"Switches and Hubs", + "hostname":"DC-T-9300.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 19:00:21", + "lastUpdateTime":1721323875769, + "lastUpdated":"2024-07-18 17:31:15", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"00:b6:70:32:b8:00", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.0", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204. 1. 2. 5", + "pendingSyncRequestsCount":"1", + "platformId":"C9300-24P", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"Periodic", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FCW2225C020", + "series":"Cisco Catalyst 9300 Series Switches", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.14.1", + "tagCount":"0", + "type":"Cisco Catalyst 9300 Switch", + "upTime":"52 days, 14:57:41.19", + "uptimeSeconds":4551979, + "vendor":"Cisco" + }, + { + "instanceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-28 00:14:36", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"Managed", + "description":"Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 17.12.2, RELEASE SOFTWARE (fc2) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2023 by Cisco Systems, Inc. Compiled Tue 14-Nov-23 05:56 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.2", + "family":"Switches and Hubs", + "hostname":"NY-EN-9300.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 17:40:01", + "lastUpdateTime":1721324496374, + "lastUpdated":"2024-07-18 17:41:36", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"90:88:55:07:59:00", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.2", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204. 1. 2. 2", + "pendingSyncRequestsCount":"0", + "platformId":"C9300-48UXM, C9300-48UXM", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FJC271924K0, FJC271924EQ", + "series":"Cisco Catalyst 9300 Series Switches", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.12.2", + "tagCount":"0", + "type":"Cisco Catalyst 9300 Switch", + "upTime":"51 days, 17:27:00.06", + "uptimeSeconds":4473958, + "vendor":"Cisco" + }, + { + "instanceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-27 22:21:03", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"Managed", + "description":"Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 17.14.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2024 by Cisco Systems, Inc. Compiled Fri 05-Apr-24 00:08 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.3", + "family":"Switches and Hubs", + "hostname":"NY-BN-9300.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 17:40:01", + "lastUpdateTime":1721324523813, + "lastUpdated":"2024-07-18 17:42:03", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"0c:75:bd:41:14:00", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.3", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204. 1. 2. 4", + "pendingSyncRequestsCount":"0", + "platformId":"C9300-48UXM, C9300-48UXM", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"", + "role":"DISTRIBUTION", + "roleSource":"AUTO", + "serialNumber":"FJB2334D06N, FJC2335S09D", + "series":"Cisco Catalyst 9300 Series Switches", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.14.1", + "tagCount":"0", + "type":"Cisco Catalyst 9300 Switch", + "upTime":"51 days, 19:21:44.15", + "uptimeSeconds":4480771, + "vendor":"Cisco" + } + ], + "version":"1.0", + "siteId":"3cf15665-7b7b-4b29-82a9-75b8d094b602" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"c9c21b46-5956-4e6e-9dbf-49f3e6e55a66", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"eda30e7b-0e67-4879-85bd-cfc30b0d9765", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"16244588-f6da-4ef7-b329-87eed13902be", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"a83421d0-cfe5-4318-85ee-a991d2cdd748", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"0d64a127-ae63-46f8-9b76-9d7d1502c6d4", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"f5c31c72-6d56-456b-aefb-d7cc942e5b04", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"67966786-b701-4099-8e1a-4191534f36d2", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"89b128e0-3217-4f63-bf99-b202ec7c0103", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"16b5e550-d288-4e11-94a6-baaa8e3d9c08", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"8c57bcf3-b0e4-4f47-b45e-bbb9f32e2997", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"be5fd8eb-dda4-4f38-b5ce-35d1d49151cc", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"4996f8ef-8933-412e-b58b-2238ba860ec7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"d44f3eca-a3dc-4ed1-a020-0ded43c78056", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"fb5bbd30-3a01-4eaf-a24d-b0e75ff158c6", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"ea574cd8-fa45-48ab-9944-83ed33537416", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"ed089cbf-3622-492f-bf60-5baf6d0b3708", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"47a127ae-92bd-49ec-aed0-aec8e2a31678", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"625bcb2d-4e4a-4571-80e9-c5d2caad4ecf", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"8ff6aa1d-089f-41e2-8e42-5cad97770e7d", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"fa666989-76fb-4aa1-8caf-ad9dc6d08ef7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + { + "instanceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-27 02:35:07", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"Managed", + "description":"Cisco IOS Software [Dublin], Catalyst L3 Switch Software (CAT9K_IOSXE), Version 17.14.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2024 by Cisco Systems, Inc. Compiled Fri 05-Apr-24 00:08 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.4", + "family":"Switches and Hubs", + "hostname":"SJ-EN-9300.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 17:40:01", + "lastUpdateTime":1721324467241, + "lastUpdated":"2024-07-18 17:41:07", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"90:88:55:8e:42:80", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.4", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204. 1. 2. 1", + "pendingSyncRequestsCount":"0", + "platformId":"C9300-48T", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FJC2721271T", + "series":"Cisco Catalyst 9300 Series Switches", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.14.1", + "tagCount":"0", + "type":"Cisco Catalyst 9300 Switch", + "upTime":"52 days, 15:06:55.77", + "uptimeSeconds":4551928, + "vendor":"Cisco" + } + ], + "version":"1.0", + "siteId":"274da223-2411-4689-8f70-b5bbd8915020" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"b497a0ab-3ab4-42fd-8921-2f45af587b98", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"ef6944e0-72be-4d1d-8e29-1ca1ebcf8d98", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"94f61603-5f1f-4b26-85dd-59355cd67632", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"633a40de-b885-448c-bd84-dd1fef679fbe", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"e3c898bc-a0d5-47b9-83c6-a48a88fa6fbe", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + { + "instanceUuid":"37b05b0f-1b1e-496a-b101-8f277f0af8ff", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":2, + "apEthernetMacAddress":"34:5d:a8:0e:20:b4", + "apManagerInterfaceIp":"192.168.0.5", + "associatedWlcIp":"192.168.0.5", + "collectionInterval":"NA", + "collectionStatus":"Managed", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"", + "errorCode":"null", + "family":"Unified AP", + "hostname":"LTTS-test1", + "interfaceCount":"0", + "inventoryStatusDetail":"NA", + "lastDeviceResyncStartTime":"", + "lastUpdateTime":1721327458431, + "lastUpdated":"2024-07-18 18:30:58", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"90:e9:5e:03:f3:40", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.5", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204. 1.216. 2", + "pendingSyncRequestsCount":"0", + "platformId":"C9130AXE-B", + "reachabilityFailureReason":"NA", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"", + "reasonsForPendingSyncRequests":"", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FJC27181V9V", + "series":"Cisco Catalyst 9130AXE Series Unified Access Points", + "snmpContact":"", + "snmpLocation":"LTTS/Cisco/Chennai", + "softwareVersion":"17.14.0.79", + "tagCount":"0", + "type":"Cisco Catalyst 9130AXE Unified Access Point", + "upTime":"3 days, 01:57:12.330", + "uptimeSeconds":268009, + "vendor":"NA" + }, + { + "instanceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "deployPending":"NONE", + "instanceVersion":0, + "apManagerInterfaceIp":"", + "associatedWlcIp":"", + "bootDateTime":"2024-05-26 21:53:58", + "collectionInterval":"Global Default", + "collectionIntervalValue":"01:30:00", + "collectionStatus":"Managed", + "description":"Cisco IOS Software [Dublin], C9800 Software (C9800_IOSXE-K9), Version 17.14.1, RELEASE SOFTWARE (fc1) Technical Support: http://www.cisco.com/techsupport Copyright (c) 1986-2024 by Cisco Systems, Inc. Compiled Fri 05-Apr-24 00:11 by mcpre netconf enabled", + "deviceSupportLevel":"Supported", + "dnsResolvedManagementAddress":"192.168.0.6", + "family":"Wireless Controller", + "hostname":"NY-EWLC-1.cisco.local", + "interfaceCount":"0", + "inventoryStatusDetail":"", + "lastDeviceResyncStartTime":"2024-07-18 18:30:26", + "lastUpdateTime":1721327458431, + "lastUpdated":"2024-07-18 18:30:58", + "lineCardCount":"0", + "lineCardId":"", + "macAddress":"cc:b6:c8:e2:29:0b", + "managedAtleastOnce":false, + "managementIpAddress":"192.168.0.6", + "managementState":"Managed", + "memorySize":"NA", + "paddedMgmtIpAddress":"204.192. 6.200", + "pendingSyncRequestsCount":"0", + "platformId":"C9800-40-K9", + "reachabilityFailureReason":"", + "reachabilityStatus":"Reachable", + "reasonsForDeviceResync":"Periodic", + "reasonsForPendingSyncRequests":"", + "role":"ACCESS", + "roleSource":"AUTO", + "serialNumber":"FOX2639PAY7", + "series":"Cisco Catalyst 9800 Series Wireless Controllers", + "snmpContact":"", + "snmpLocation":"", + "softwareType":"IOS-XE", + "softwareVersion":"17.14.1", + "tagCount":"0", + "type":"Cisco Catalyst 9800-40 Wireless Controller", + "upTime":"52 days, 20:37:58.64", + "uptimeSeconds":4568797, + "vendor":"Cisco" + } + ], + "version":"1.0", + "siteId":"17301034-7715-4363-952f-3d290ea6ca59" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"8a7ddd03-dddb-4a76-a079-56c3b45ab1ec", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"c45259ff-0612-4fe7-907c-5987877892d9", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"eb935311-f082-416e-a13c-08acdc6219c0", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"78b8a15c-c112-4941-b00b-ceda2edb38f2", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"212be018-cfb6-4041-9caa-d344385848b7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"5e6d602a-4135-44ef-a5ae-8d9ee6056f3b", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"6f4d01b1-d00c-4471-8aa2-28b7e99636ab", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"bf561bf3-95d6-4da1-bf49-26887955fa2e", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"80143381-187c-48fa-a356-15389aad4e9c", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"d0484233-604a-4972-b010-42a0d44fe3d6", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"21cc7dad-8c9e-4637-8f24-22ec417b9811", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"3fbfb158-a429-41b3-a220-6a6286f93d16", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"7002e28c-a309-454b-ac5d-a6a99d64bc20", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"4a03cd04-41bb-4e3c-9a59-3f96637c27e7", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"65eba291-ee04-43d2-bddb-a2cb2e7ff7d8", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"398f4d42-d265-4233-8ec3-5e4ba73c9956", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"0e238b6e-e390-4dae-8932-49ceb3376304", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"9674054e-fd9e-49ed-8084-1ce9131d6781", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"05d2d29c-3c23-478e-88ee-7ec60398634f", + "message":"Site doesn’t not have device member with given device family or serial number as input" + }, + { + "response":[ + + ], + "version":"1.0", + "siteId":"69f31d51-9e0d-48f4-8546-4935253f9a67", + "message":"Site doesn’t not have device member with given device family or serial number as input" + } + ] + }, + "response_get_compliance_details_of_device_1":{ + "response":[ + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721042297620, + "lastUpdateTime":1721061010296, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1721042297708, + "lastUpdateTime":1721061010419, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"NETWORK_SETTINGS", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1721042297420, + "lastUpdateTime":1721061010438, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721042297733, + "lastUpdateTime":1721061010335, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721042299163, + "lastUpdateTime":1721061010242, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_compliance_details_of_device_2":{ + "response":[ + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766741478, + "lastUpdateTime":1721329212290, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716766741495, + "lastUpdateTime":1721329211854, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"NETWORK_SETTINGS", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766741320, + "lastUpdateTime":1721329212309, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716777549860, + "lastUpdateTime":1721329211804, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=3bf3f269-88ae-48fc-910d-3263ba618f87", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820546, + "lastUpdateTime":1721329211772, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87" + }, + "response_get_compliance_details_of_device_3":{ + "response":[ + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716766953803, + "lastUpdateTime":1721329211858, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651251, + "lastUpdateTime":1721329211782, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766953785, + "lastUpdateTime":1721329212295, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"NETWORK_SETTINGS", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766953670, + "lastUpdateTime":1721329212314, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"IMAGE", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716767009114, + "lastUpdateTime":1721329211817, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=9db11f54-8007-438c-ba9b-711513deecc6", + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6" + }, + "response_get_compliance_details_of_device_4":{ + "response":[ + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716766960299, + "lastUpdateTime":1721329211853, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"NETWORK_SETTINGS", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766960102, + "lastUpdateTime":1721329212302, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651133, + "lastUpdateTime":1721329211787, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716848392594, + "lastUpdateTime":1721329211814, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=f490e92f-490e-4bb1-9519-770b1dc604c4", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766960286, + "lastUpdateTime":1721329212282, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4" + }, + "response_get_compliance_details_of_device_5":{ + "response":[ + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"NETWORK_SETTINGS", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720220400523, + "lastUpdateTime":1721329212302, + "sourceInfoList":[ + { + "name":"NeSnmpSettings", + "nameWithBusinessKey":"NeSnmpSettings", + "sourceEnum":"NETWORK_SETTINGS", + "type":"snmp.trap.receiver", + "appName":"General", + "count":1, + "ackStatus":"UNACKNOWLEDGED", + "businessKey":{ + "resourceName":"NeSnmpSettings", + "businessKeyAttributes":{ + + }, + "otherAttributes":{ + "name":"rfs", + "cfsAttributes":{ + "displayName":"Snmp Trap Server", + "appName":"General", + "description":"Snmp trap server configuration on the Device", + "source":"NETWORK_SETTINGS", + "type":"snmp.trap.receiver" + } + } + }, + "diffList":[ + { + "op":"remove", + "configuredValue":"false", + "intendedValue":"true", + "moveFromPath":"None", + "businessKey":"c6f6ebc5[146945843_146945843]", + "path":"/areTrapsEnabled", + "extendedAttributes":{ + "attributeDisplayName":"Traps Enable" + }, + "ackStatus":"UNACKNOWLEDGED", + "instanceUUID":"988ea8d2-b004-4e59-aab7-588b398325e9", + "displayName":"Traps Enable" + } + ], + "displayName":"snmp.trap.receiver" + } + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820501, + "lastUpdateTime":1721329211781, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716777720014, + "lastUpdateTime":1721329211810, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1716766910543, + "lastUpdateTime":1721329212282, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1716766910558, + "lastUpdateTime":1721329211851, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38" + }, + "response_get_compliance_details_of_device_6":{ + "response":[ + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720782111014, + "lastUpdateTime":1721329211807, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"NETWORK_SETTINGS", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720800910419, + "lastUpdateTime":1721329212303, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720782060442, + "lastUpdateTime":1721329211778, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"EOX", + "status":"NOT_APPLICABLE", + "state":"SUCCESS", + "lastSyncTime":1720782057642, + "lastUpdateTime":1721329212282, + "sourceInfoList":[ + + ], + "message":"EOX status not available.", + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720782057661, + "lastUpdateTime":1721329211853, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + }, + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"NETWORK_PROFILE", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720800928124, + "lastUpdateTime":1721329225765, + "sourceInfoList":[ + { + "name":"WlanConfig", + "nameWithBusinessKey":"WlanConfig-Single5KBand_profile", + "sourceEnum":"NETWORK_PROFILE", + "type":"wlan", + "appName":"Wireless", + "count":1, + "ackStatus":"UNACKNOWLEDGED", + "businessKey":{ + "resourceName":"WlanConfig", + "businessKeyAttributes":{ + "profileName":"Single5KBand_profile", + "owningEntityId":"515666_515666" + }, + "otherAttributes":{ + "name":"rfs", + "cfsAttributes":{ + "displayName":"Wlan", + "appName":"Wireless", + "description":"This is description of Wlan ", + "source":"NETWORK_PROFILE", + "type":"wlan" + } + } + }, + "diffList":[ + { + "op":"replace", + "configuredValue":"Enable", + "intendedValue":"Disable", + "moveFromPath":"None", + "businessKey":"c4934299[515666_515666,Single5KBand_profile]", + "path":"/rsnCipherSuiteCcmp128", + "extendedAttributes":{ + "path":"wlan", + "attributeDisplayName":"WPA2 Encryption CCMP128", + "dataConverter":"com.cisco.dnac.compliance.intent.util.EnableAndDisableModeforBoolean", + "type":"Intent" + }, + "ackStatus":"UNACKNOWLEDGED", + "instanceUUID":"1d962bd0-efb4-43bb-b396-3b9577641382", + "displayName":"WPA2 Encryption CCMP128" + } + ] + } + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4" + }, + "response_run_compliance_success":{ + "response":{ + "taskId":"34629bf3-c191-404d-b5b7-3e445d25457b", + "url":"/api/v1/task/34629bf3-c191-404d-b5b7-3e445d25457b" + }, + "version":"1.0" + }, + "response_get_task_by_id_success":{ + "response":{ + "version":1721067017918, + "progress":"Compliance report has been generated successfully", + "startTime":1721067017216, + "endTime":1721067017918, + "serviceType":"COMPLIANCE SERVICE", + "isError":false, + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"34629bf3-c191-404d-b5b7-3e445d25457b" + }, + "version":"1.0" + }, + "response_get_compliance_details_of_device_category_1_1":{ + "response":[ + + ], + "version":"1.0", + "deviceUuid":"None" + }, + "response_get_compliance_details_of_device_category_1_2":{ + "response":[ + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721269880150, + "lastUpdateTime":1721329241258, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_compliance_details_of_device_category_1_3":{ + "response":[ + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"IMAGE", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721269878724, + "lastUpdateTime":1721329241282, + "sourceInfoList":[ + + ], + "additionalDataURL":"/api/v2/device-image/device?id=92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_compliance_details_of_device_category_1_4":{ + "response":[ + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"PSIRT", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1721269878437, + "lastUpdateTime":1721329241337, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_device_list_success_2":{ + "response":[ + { + "family":"Wireless Controller", + "managementIpAddress":"192.168.0.1", + "reachabilityStatus":"Reachable", + "instanceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"3bf3f269-88ae-48fc-910d-3263ba618f87" + } + ], + "version":"1.0" + }, + "response_run_compliance_success_2":{ + "response":{ + "taskId":"ce5e3f8d-9ac7-4215-9b83-fac7228c9e63", + "url":"/api/v1/task/ce5e3f8d-9ac7-4215-9b83-fac7228c9e63" + }, + "version":"1.0" + }, + "response_get_task_by_id_success_2":{ + "response":{ + "startTime":1721609912040, + "version":1721609912684, + "progress":"Compliance report has been generated successfully", + "endTime":1721609912684, + "serviceType":"COMPLIANCE SERVICE", + "isError":false, + "instanceTenantId":"6486ce96ff1f0d0c8be622f4", + "id":"ce5e3f8d-9ac7-4215-9b83-fac7228c9e63" + }, + "version":"1.0" + }, + "response_get_compliance_details_of_device_1_running_config":{ + "response":[ + { + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820546, + "lastUpdateTime":1721609911624, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_compliance_details_of_device_2_running_config":{ + "response":[ + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820546, + "lastUpdateTime":1721329211772, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87" + }, + "response_get_compliance_details_of_device_3_running_config":{ + "response":[ + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651251, + "lastUpdateTime":1721329211782, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6" + }, + "response_get_compliance_details_of_device_4_running_config":{ + "response":[ + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651133, + "lastUpdateTime":1721329211787, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4" + }, + "response_get_compliance_details_of_device_5_running_config":{ + "response":[ + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820501, + "lastUpdateTime":1721329211781, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38" + }, + "response_get_compliance_details_of_device_6_running_config":{ + "response":[ + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"RUNNING_CONFIG", + "status":"NON_COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720782060442, + "lastUpdateTime":1721329211778, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4" + }, + "response_get_compliance_details_of_device_1_running_config_2":{ + "response":[ + { + "deviceUuid":"392ffce88-9fce-41d2-ae69-086fa74e9c4b", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820546, + "lastUpdateTime":1721609911624, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"92ffce88-9fce-41d2-ae69-086fa74e9c4b" + }, + "response_get_compliance_details_of_device_2_running_config_2":{ + "response":[ + { + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820546, + "lastUpdateTime":1721329211772, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"3bf3f269-88ae-48fc-910d-3263ba618f87" + }, + "response_get_compliance_details_of_device_3_running_config_2":{ + "response":[ + { + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651251, + "lastUpdateTime":1721329211782, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"9db11f54-8007-438c-ba9b-711513deecc6" + }, + "response_get_compliance_details_of_device_4_running_config_2":{ + "response":[ + { + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720725651133, + "lastUpdateTime":1721329211787, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"f490e92f-490e-4bb1-9519-770b1dc604c4" + }, + "response_get_compliance_details_of_device_5_running_config_2":{ + "response":[ + { + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1717977820501, + "lastUpdateTime":1721329211781, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38" + }, + "response_get_compliance_details_of_device_6_running_config_2":{ + "response":[ + { + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4", + "complianceType":"RUNNING_CONFIG", + "status":"COMPLIANT", + "state":"SUCCESS", + "lastSyncTime":1720782060442, + "lastUpdateTime":1721329211778, + "sourceInfoList":[ + + ], + "ackStatus":"UNACKNOWLEDGED" + } + ], + "version":"1.0", + "deviceUuid":"778a27bb-d795-4fa3-a321-f2e693ebe1f4" + }, + "response_commit_device_configuration":{ + "response":{ + "taskId":"ce5e3f8d-9ac7-4215-9b83-fac7228c9e63", + "url":"/api/v1/task/ce5e3f8d-9ac7-4215-9b83-fac7228c9e63" + }, + "version":"1.0" + }, + "response_get_task_tree_success":{ + "response":[ + { + "progress":"92ffce88-9fce-41d2-ae69-086fa74e9c4b copy_Running_To_Startup=Success" + }, + { + "progress":"92ffce88-9fce-41d2-ae69-086fa74e9c4b copy_Running_To_Startup=Success" + }, + { + "progress":"3bf3f269-88ae-48fc-910d-3263ba618f87 copy_Running_To_Startup=Success" + }, + { + "progress":"9db11f54-8007-438c-ba9b-711513deecc6 copy_Running_To_Startup=Success" + }, + { + "progress":"f490e92f-490e-4bb1-9519-770b1dc604c4 copy_Running_To_Startup=Success" + }, + { + "progress":"e0bdf3e1-fbcf-4faa-a11c-156e32e7ae38 copy_Running_To_Startup=Success" + }, + { + "progress":"778a27bb-d795-4fa3-a321-f2e693ebe1f4 copy_Running_To_Startup=Success" + } + ], + "version":"string" + }, + "response_get_compliance_details_of_device_empty":{ + } +} \ No newline at end of file diff --git a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py new file mode 100644 index 0000000000..5ff55eb208 --- /dev/null +++ b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py @@ -0,0 +1,846 @@ +# Copyright (c) 2020 Cisco and/or its affiliates. +# +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# Make coding more python3-ish +from __future__ import absolute_import, division, print_function + + +import json +import copy +import logging + + +__metaclass__ = type +import pdb + +from dnacentersdk import exceptions +from unittest.mock import patch + +import sys +sys.path.insert(0, "/Users/rukapse/ansible/dnac/work/collections") + +from ansible_collections.cisco.dnac.tests.unit.modules.dnac.dnac_module import TestDnacModule, set_module_args, loadPlaybookData +from ansible_collections.cisco.dnac.plugins.modules import network_compliance_workflow_manager + + +class TestNetworkCompliance(TestDnacModule): + + module = network_compliance_workflow_manager + + test_data = loadPlaybookData("network_compliance_workflow_manager") + + def setUp(self): + super(TestNetworkCompliance, self).setUp() + + self.mock_dnac_init = patch( + "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.__init__") + self.run_dnac_init = self.mock_dnac_init.start() + self.run_dnac_init.side_effect = [None] + self.mock_dnac_exec = patch( + "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK._exec" + ) + self.run_dnac_exec = self.mock_dnac_exec.start() + print(f"Mock for DNACSDK._exec: {self.run_dnac_exec}") + + def tearDown(self): + super(TestNetworkCompliance, self).tearDown() + self.mock_dnac_init.stop() + self.mock_dnac_exec.stop() + + + def load_fixtures(self, response=None, device=""): + print("Inside load_fixtures") + + ##################### FIXTURE FOR SUCCESS TESTCASES #################### + + # Run full compliance using an IP Address list + if "run_compliance_with_iplist" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + ] + + + # Run full compliance using Site + if "run_compliance_with_site" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + ] + + # Run full compliance using both IP Address and Site + if "run_compliance_with_iplist_site" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + ] + + # Run compliance against specific categories using IP Address List + if "run_compliance_categories_iplist" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_category_1_1"), + self.test_data.get("response_get_compliance_details_of_device_category_1_2"), + self.test_data.get("response_get_compliance_details_of_device_category_1_3"), + self.test_data.get("response_get_compliance_details_of_device_category_1_4"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_compliance_details_of_device_category_1_1"), + self.test_data.get("response_get_compliance_details_of_device_category_1_2"), + self.test_data.get("response_get_compliance_details_of_device_category_1_3"), + self.test_data.get("response_get_compliance_details_of_device_category_1_4"), + ] + + # Scale - Run full compliance operation + if "scale_run_compliance" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_device_list_success_2"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_run_compliance_success_2"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_task_by_id_success_2"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + ] + + # Run Sync Device Config using IP Address list - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + if "sync_device_config_iplist" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config"), + self.test_data.get("response_commit_device_configuration"), + self.test_data.get("response_get_task_tree_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config_2") + ] + + # Run Sync Device Config using Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + if "sync_device_config_site" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config"), + self.test_data.get("response_get_compliance_details_of_device_2_running_config"), + self.test_data.get("response_get_compliance_details_of_device_3_running_config"), + self.test_data.get("response_get_compliance_details_of_device_4_running_config"), + self.test_data.get("response_get_compliance_details_of_device_5_running_config"), + self.test_data.get("response_get_compliance_details_of_device_6_running_config"), + self.test_data.get("response_commit_device_configuration"), + self.test_data.get("response_get_task_tree_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_2_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_3_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_4_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_5_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_6_running_config_2") + ] + + # Run Sync Device Config using both IP Address List and Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + if "sync_device_config_iplist_site" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config"), + self.test_data.get("response_get_compliance_details_of_device_2_running_config"), + self.test_data.get("response_get_compliance_details_of_device_3_running_config"), + self.test_data.get("response_get_compliance_details_of_device_4_running_config"), + self.test_data.get("response_get_compliance_details_of_device_5_running_config"), + self.test_data.get("response_get_compliance_details_of_device_6_running_config"), + self.test_data.get("response_commit_device_configuration"), + self.test_data.get("response_get_task_tree_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_2_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_3_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_4_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_5_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_6_running_config_2") + ] + + # Run Sync Device Config using both IP Address List and Site - Not required (All devices with RUNNING_CONFIG status - 'COMPLIANT' or other) + if "sync_device_config_iplist_site_nr" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_2_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_3_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_4_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_5_running_config_2"), + self.test_data.get("response_get_compliance_details_of_device_6_running_config_2") + ] + + ###################### FIXTURES FOR FAILURE TESTCASES #################### + + # Run full compliance using an IP Address list - Failure 1 + if "run_compliance_with_iplist_failure_1" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + Exception("Simulated exception"), + #self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + ] + + # Run full compliance using an IP Address list - Failure 2 + if "run_compliance_with_iplist_failure_2" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + Exception("Simulated exception") + ] + + # Run full compliance using an IP Address list - Failure 3 + if "run_compliance_with_iplist_failure_3" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + Exception("Simulated exception"), + ] + + # Run full compliance using an IP Address list - Failure 4 + if "run_compliance_with_iplist_failure_4" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_run_compliance_success"), + Exception("Simulated exception"), + ] + + # Run full compliance using an IP Address list - Failure 5 + if "run_compliance_with_iplist_failure_5" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + Exception("Simulated exception"), + ] + + # Run full compliance using Site - Failure 1 + if "run_compliance_with_site_failure_1" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + Exception("Simulated exception") + ] + + # Run full compliance using Site - Failure 2 + if "run_compliance_with_site_failure_2" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + Exception("Simulated exception") + ] + + # Run full compliance using Site - Failure 3 + if "run_compliance_with_site_failure_3" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + Exception("Simulated exception") + ] + + + # Run full compliance using Site - Failure 4 + if "run_compliance_with_site_failure_4" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + Exception("Simulated exception") + ] + + # Run full compliance using Site - Failure 5 + if "run_compliance_with_site_failure_5" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + self.test_data.get("response_run_compliance_success"), + Exception("Simulated exception") + ] + + # Run full compliance using Site - Failure 6 + if "run_compliance_with_site_failure_6" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_site_success"), + self.test_data.get("response_get_membership_success"), + self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_2"), + self.test_data.get("response_get_compliance_details_of_device_3"), + self.test_data.get("response_get_compliance_details_of_device_4"), + self.test_data.get("response_get_compliance_details_of_device_5"), + self.test_data.get("response_get_compliance_details_of_device_6"), + self.test_data.get("response_run_compliance_success"), + self.test_data.get("response_get_task_by_id_success"), + Exception("Simulated exception") + ] + + # Run Sync Device Config using IP Address list - Failure 1 + if "sync_device_config_iplist_failure_1" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config"), + Exception("Simulated exception") + ] + + # Run Sync Device Config using IP Address list - Failure 2 + if "sync_device_config_iplist_failure_2" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("response_get_device_list_success"), + self.test_data.get("response_get_compliance_details_of_device_1_running_config"), + self.test_data.get("response_commit_device_configuration"), + Exception("Simulated exception") + ] + +############################################# SUCCESS TESTCASES ############################################ + + + +# Run full compliance using an IP Address list + def test_run_compliance_with_iplist(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertEqual( + result.get('msg'), + "Run Compliance Check has completed successfully on 1 device(s): 192.168.0.0" + ) + +# Run full compliance using Site + def test_run_compliance_with_site(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertIn( + "Run Compliance Check has completed successfully on 6 device(s):", + result.get('msg') + + ) + +# Run full compliance using both IP Address and Site + def test_run_compliance_with_iplist_site(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist_site") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertIn( + "Run Compliance Check has completed successfully on 6 device(s):", + result.get('msg') + + ) + + +# Run compliance against specific categories using IP Address List + def test_run_compliance_categories_iplist(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_categories_iplist") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertEqual( + result.get('msg'), + "Run Compliance Check has completed successfully on 1 device(s): 192.168.0.0" + ) + +# Scale - Run full compliance operation using both IP Address List and Site + def test_scale_run_compliance(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_scale_iplist") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertIn( + "Run Compliance Check has completed successfully on 2 device(s):", + result.get('msg') + + ) + +# Run Sync Device Config using IP Address list - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + def test_sync_device_config_iplist(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_iplist") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertEqual( + result.get('msg'), + "Sync Device Configuration has completed successfully on 1 device(s): 192.168.0.0" + ) + +# Run Sync Device Config using Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + def test_sync_device_config_site(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_site") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertIn( + "Sync Device Configuration has completed successfully on 6 device(s):", + result.get('msg') + + ) + +# Run Sync Device Config using both IP Address List and Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') + def test_sync_device_config_iplist_site(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_iplist_site") + ) + ) + result = self.execute_module(changed=True, failed=False) + self.assertIn( + "Sync Device Configuration has completed successfully on 6 device(s)", + result.get('msg') + + ) + +# Run Sync Device Config using both IP Address List and Site - Not required (All devices with RUNNING_CONFIG status - 'COMPLIANT' or other) + def test_sync_device_config_iplist_site_nr(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_iplist_site_nr") + ) + ) + result = self.execute_module(changed=False, failed=False) + self.assertIn( + "the task 'Sync Device Configuration' is not required.", + result.get('msg') + + ) + + + +############################################# FAILURE TESTCASES ############################################# + + +# Run full compliance using an IP Address list - Failure 1 + def test_run_compliance_with_iplist_failure_1(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=False, failed=False) + self.assertEqual( + result.get('msg'), + "No reachable devices found among the provided IP addresses: 192.168.0.0" + ) + +# Run full compliance using an IP Address list - Failure 2 + def test_run_compliance_with_iplist_failure_2(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving Compliance Details for device:192.168.0.0 using 'compliance_details_of_device' API call", + result.get('msg') + ) + +# Run full compliance using an IP Address list - Failure 3 + def test_run_compliance_with_iplist_failure_3(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertEqual( + "An error occurred while retrieving the task_id of the run_compliance operation.", + result.get('msg') + ) + + +# Run full compliance using an IP Address list - Failure 4 + def test_run_compliance_with_iplist_failure_4(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "Error occurred while retrieving 'get_task_by_id' for Task Run Compliance Check with Task id", + result.get('msg') + ) + + +# Run full compliance using an IP Address list - Failure 5 + def test_run_compliance_with_iplist_failure_5(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving Compliance Details for device:192.168.0.0 using 'compliance_details_of_device' API call", + result.get('msg') + ) + +# Run full compliance using Site - Failure 1 + def test_run_compliance_with_site_failure_1(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving site details for Site 'Global'. Please verify that the site exists.", + result.get('msg') + ) + + +# Run full compliance using Site - Failure 2 + def test_run_compliance_with_site_failure_2(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=False) + self.assertIn( + "Reachable devices not found at Site: Global", + result.get('msg') + ) + + +# Run full compliance using Site - Failure 3 + def test_run_compliance_with_site_failure_3(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving Compliance Details for device:192.168.0.3 using 'compliance_details_of_device' API call", + result.get('msg') + ) + + +# Run full compliance using Site - Failure 4 + def test_run_compliance_with_site_failure_4(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving the task_id of the run_compliance operation.", + result.get('msg') + ) + + +# Run full compliance using Site - Failure 5 + def test_run_compliance_with_site_failure_5(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "Error occurred while retrieving 'get_task_by_id' for Task Run Compliance Check with Task id", + result.get('msg') + ) + +# Run full compliance using Site - Failure 6 + def test_run_compliance_with_site_failure_6(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=False, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_run_compliance_site") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "An error occurred while retrieving Compliance Details for device:192.168.0.1 using 'compliance_details_of_device' API call", + result.get('msg') + ) + +# Run Sync Device Config using IP Address list - Failure 1 + def test_sync_device_config_iplist_failure_1(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "Error occurred while synchronizing device configuration for parameters - {'deviceId':", + result.get('msg') + + ) + + +# Run Sync Device Config using IP Address list - Failure 2 + def test_sync_device_config_iplist_failure_2(self): + + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + dnac_log_level="DEBUG", + dnac_log_append=False, + state="merged", + config=self.test_data.get("playbook_config_sync_device_config_iplist") + ) + ) + result = self.execute_module(changed=False, failed=True) + self.assertIn( + "Error occurred while retrieving 'get_task_tree' for Task Sync Device Configuration with task id", + result.get('msg') + + ) + + + + + + + + From 2c7554a4aa15f36dbe1e5c7907206a57ad7e8eea Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 22 Jul 2024 19:40:46 -0700 Subject: [PATCH 089/119] UTs & minor changes - Network Compliance module --- .../network_compliance_workflow_manager.py | 3 +- ...est_network_compliance_workflow_manager.py | 44 ++----------------- 2 files changed, 4 insertions(+), 43 deletions(-) diff --git a/plugins/modules/network_compliance_workflow_manager.py b/plugins/modules/network_compliance_workflow_manager.py index dbe79b5a57..0d65d808fe 100644 --- a/plugins/modules/network_compliance_workflow_manager.py +++ b/plugins/modules/network_compliance_workflow_manager.py @@ -981,8 +981,7 @@ def get_compliance_details_of_device(self, compliance_details_of_device_params, except Exception as e: # Handle any exceptions that occur during the API call self.msg = ("An error occurred while retrieving Compliance Details for device:{0} using 'compliance_details_of_device' API call" - ". Error: {1}".format(device_ip, str(e))) - #self.log(msg, "ERROR") + ". Error: {1}".format(device_ip, str(e))) self.update_result("failed", False, self.msg, "ERROR") self.check_return_status() diff --git a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py index 5ff55eb208..333fb90cf9 100644 --- a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py +++ b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py @@ -15,14 +15,7 @@ # Make coding more python3-ish from __future__ import absolute_import, division, print_function - -import json -import copy -import logging - - __metaclass__ = type -import pdb from dnacentersdk import exceptions from unittest.mock import patch @@ -58,7 +51,6 @@ def tearDown(self): self.mock_dnac_init.stop() self.mock_dnac_exec.stop() - def load_fixtures(self, response=None, device=""): print("Inside load_fixtures") @@ -74,7 +66,6 @@ def load_fixtures(self, response=None, device=""): self.test_data.get("response_get_compliance_details_of_device_1"), ] - # Run full compliance using Site if "run_compliance_with_site" in self._testMethodName: self.run_dnac_exec.side_effect = [ @@ -287,7 +278,6 @@ def load_fixtures(self, response=None, device=""): Exception("Simulated exception") ] - # Run full compliance using Site - Failure 4 if "run_compliance_with_site_failure_4" in self._testMethodName: self.run_dnac_exec.side_effect = [ @@ -352,8 +342,6 @@ def load_fixtures(self, response=None, device=""): ############################################# SUCCESS TESTCASES ############################################ - - # Run full compliance using an IP Address list def test_run_compliance_with_iplist(self): @@ -394,7 +382,6 @@ def test_run_compliance_with_site(self): self.assertIn( "Run Compliance Check has completed successfully on 6 device(s):", result.get('msg') - ) # Run full compliance using both IP Address and Site @@ -416,10 +403,8 @@ def test_run_compliance_with_iplist_site(self): self.assertIn( "Run Compliance Check has completed successfully on 6 device(s):", result.get('msg') - ) - # Run compliance against specific categories using IP Address List def test_run_compliance_categories_iplist(self): @@ -502,8 +487,7 @@ def test_sync_device_config_site(self): result = self.execute_module(changed=True, failed=False) self.assertIn( "Sync Device Configuration has completed successfully on 6 device(s):", - result.get('msg') - + result.get('msg') ) # Run Sync Device Config using both IP Address List and Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') @@ -525,7 +509,6 @@ def test_sync_device_config_iplist_site(self): self.assertIn( "Sync Device Configuration has completed successfully on 6 device(s)", result.get('msg') - ) # Run Sync Device Config using both IP Address List and Site - Not required (All devices with RUNNING_CONFIG status - 'COMPLIANT' or other) @@ -547,15 +530,11 @@ def test_sync_device_config_iplist_site_nr(self): self.assertIn( "the task 'Sync Device Configuration' is not required.", result.get('msg') - ) - - ############################################# FAILURE TESTCASES ############################################# - -# Run full compliance using an IP Address list - Failure 1 +# Run full compliance using an IP Address list - Failure 1 def test_run_compliance_with_iplist_failure_1(self): set_module_args( @@ -618,7 +597,6 @@ def test_run_compliance_with_iplist_failure_3(self): result.get('msg') ) - # Run full compliance using an IP Address list - Failure 4 def test_run_compliance_with_iplist_failure_4(self): @@ -640,7 +618,6 @@ def test_run_compliance_with_iplist_failure_4(self): result.get('msg') ) - # Run full compliance using an IP Address list - Failure 5 def test_run_compliance_with_iplist_failure_5(self): @@ -683,7 +660,6 @@ def test_run_compliance_with_site_failure_1(self): result.get('msg') ) - # Run full compliance using Site - Failure 2 def test_run_compliance_with_site_failure_2(self): @@ -705,7 +681,6 @@ def test_run_compliance_with_site_failure_2(self): result.get('msg') ) - # Run full compliance using Site - Failure 3 def test_run_compliance_with_site_failure_3(self): @@ -727,7 +702,6 @@ def test_run_compliance_with_site_failure_3(self): result.get('msg') ) - # Run full compliance using Site - Failure 4 def test_run_compliance_with_site_failure_4(self): @@ -749,7 +723,6 @@ def test_run_compliance_with_site_failure_4(self): result.get('msg') ) - # Run full compliance using Site - Failure 5 def test_run_compliance_with_site_failure_5(self): @@ -792,7 +765,7 @@ def test_run_compliance_with_site_failure_6(self): result.get('msg') ) -# Run Sync Device Config using IP Address list - Failure 1 +# Run Sync Device Config using IP Address list - Failure 1 def test_sync_device_config_iplist_failure_1(self): set_module_args( @@ -811,10 +784,8 @@ def test_sync_device_config_iplist_failure_1(self): self.assertIn( "Error occurred while synchronizing device configuration for parameters - {'deviceId':", result.get('msg') - ) - # Run Sync Device Config using IP Address list - Failure 2 def test_sync_device_config_iplist_failure_2(self): @@ -834,13 +805,4 @@ def test_sync_device_config_iplist_failure_2(self): self.assertIn( "Error occurred while retrieving 'get_task_tree' for Task Sync Device Configuration with task id", result.get('msg') - ) - - - - - - - - From 056e1099a47aed78fb0df21a6edef249dff93bb4 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 22 Jul 2024 19:51:57 -0700 Subject: [PATCH 090/119] UTs & minor changes - Network Compliance module --- ...est_network_compliance_workflow_manager.py | 25 ++++++------------- 1 file changed, 8 insertions(+), 17 deletions(-) diff --git a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py index 333fb90cf9..00981dbc7d 100644 --- a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py +++ b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py @@ -17,15 +17,13 @@ __metaclass__ = type -from dnacentersdk import exceptions from unittest.mock import patch import sys sys.path.insert(0, "/Users/rukapse/ansible/dnac/work/collections") from ansible_collections.cisco.dnac.tests.unit.modules.dnac.dnac_module import TestDnacModule, set_module_args, loadPlaybookData -from ansible_collections.cisco.dnac.plugins.modules import network_compliance_workflow_manager - +from ansible_collections.cisco.dnac.plugins.modules import network_compliance_workflow_manager class TestNetworkCompliance(TestDnacModule): @@ -50,10 +48,9 @@ def tearDown(self): super(TestNetworkCompliance, self).tearDown() self.mock_dnac_init.stop() self.mock_dnac_exec.stop() - + def load_fixtures(self, response=None, device=""): print("Inside load_fixtures") - ##################### FIXTURE FOR SUCCESS TESTCASES #################### # Run full compliance using an IP Address list @@ -63,7 +60,7 @@ def load_fixtures(self, response=None, device=""): self.test_data.get("response_get_compliance_details_of_device_1"), self.test_data.get("response_run_compliance_success"), self.test_data.get("response_get_task_by_id_success"), - self.test_data.get("response_get_compliance_details_of_device_1"), + self.test_data.get("response_get_compliance_details_of_device_1"), ] # Run full compliance using Site @@ -208,16 +205,10 @@ def load_fixtures(self, response=None, device=""): ] ###################### FIXTURES FOR FAILURE TESTCASES #################### - - # Run full compliance using an IP Address list - Failure 1 + # Run full compliance using an IP Address list - Failure 1 if "run_compliance_with_iplist_failure_1" in self._testMethodName: self.run_dnac_exec.side_effect = [ - Exception("Simulated exception"), - #self.test_data.get("response_get_device_list_success"), - self.test_data.get("response_get_compliance_details_of_device_1"), - self.test_data.get("response_run_compliance_success"), - self.test_data.get("response_get_task_by_id_success"), - self.test_data.get("response_get_compliance_details_of_device_1"), + Exception("Simulated exception") ] # Run full compliance using an IP Address list - Failure 2 @@ -254,7 +245,7 @@ def load_fixtures(self, response=None, device=""): Exception("Simulated exception"), ] - # Run full compliance using Site - Failure 1 + # Run full compliance using Site - Failure 1 if "run_compliance_with_site_failure_1" in self._testMethodName: self.run_dnac_exec.side_effect = [ Exception("Simulated exception") @@ -445,7 +436,7 @@ def test_scale_run_compliance(self): self.assertIn( "Run Compliance Check has completed successfully on 2 device(s):", result.get('msg') - + ) # Run Sync Device Config using IP Address list - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') @@ -487,7 +478,7 @@ def test_sync_device_config_site(self): result = self.execute_module(changed=True, failed=False) self.assertIn( "Sync Device Configuration has completed successfully on 6 device(s):", - result.get('msg') + result.get('msg') ) # Run Sync Device Config using both IP Address List and Site - Sync Required (Devices with RUNNING_CONFIG status - 'NON_COMPLIANT') From 3a35d64f1934e9beb8e1046e04a52a0d3332b859 Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 22 Jul 2024 20:06:33 -0700 Subject: [PATCH 091/119] UTs & minor changes - Network Compliance module --- .../test_network_compliance_workflow_manager.py | 13 +++++++------ 1 file changed, 7 insertions(+), 6 deletions(-) diff --git a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py index 00981dbc7d..33deb08aa9 100644 --- a/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py +++ b/tests/unit/modules/dnac/test_network_compliance_workflow_manager.py @@ -25,6 +25,7 @@ from ansible_collections.cisco.dnac.tests.unit.modules.dnac.dnac_module import TestDnacModule, set_module_args, loadPlaybookData from ansible_collections.cisco.dnac.plugins.modules import network_compliance_workflow_manager + class TestNetworkCompliance(TestDnacModule): module = network_compliance_workflow_manager @@ -51,7 +52,7 @@ def tearDown(self): def load_fixtures(self, response=None, device=""): print("Inside load_fixtures") - ##################### FIXTURE FOR SUCCESS TESTCASES #################### + # FIXTURE FOR SUCCESS TESTCASES ############################################################ # Run full compliance using an IP Address list if "run_compliance_with_iplist" in self._testMethodName: @@ -204,7 +205,7 @@ def load_fixtures(self, response=None, device=""): self.test_data.get("response_get_compliance_details_of_device_6_running_config_2") ] - ###################### FIXTURES FOR FAILURE TESTCASES #################### + # FIXTURES FOR FAILURE TESTCASES ############################################################ # Run full compliance using an IP Address list - Failure 1 if "run_compliance_with_iplist_failure_1" in self._testMethodName: self.run_dnac_exec.side_effect = [ @@ -331,7 +332,7 @@ def load_fixtures(self, response=None, device=""): Exception("Simulated exception") ] -############################################# SUCCESS TESTCASES ############################################ +# SUCCESS TESTCASES ######################################################################################## # Run full compliance using an IP Address list def test_run_compliance_with_iplist(self): @@ -434,8 +435,8 @@ def test_scale_run_compliance(self): ) result = self.execute_module(changed=True, failed=False) self.assertIn( - "Run Compliance Check has completed successfully on 2 device(s):", - result.get('msg') + "Run Compliance Check has completed successfully on 2 device(s):", + result.get('msg') ) @@ -523,7 +524,7 @@ def test_sync_device_config_iplist_site_nr(self): result.get('msg') ) -############################################# FAILURE TESTCASES ############################################# +# FAILURE TESTCASES ######################################################################################## # Run full compliance using an IP Address list - Failure 1 def test_run_compliance_with_iplist_failure_1(self): From 5cf971f3ce8f14a5a412499668d8eebc6b229bbf Mon Sep 17 00:00:00 2001 From: Rugvedi Kapse Date: Mon, 22 Jul 2024 20:08:36 -0700 Subject: [PATCH 092/119] UTs & minor changes - Network Compliance module --- .../network_compliance_workflow_manager.json | 102 +++++++++--------- 1 file changed, 51 insertions(+), 51 deletions(-) diff --git a/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json b/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json index 3ec955a584..d502daec1e 100644 --- a/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json +++ b/tests/unit/modules/dnac/fixtures/network_compliance_workflow_manager.json @@ -2978,7 +2978,7 @@ ], "version":"1.0", "siteId":"c9c21b46-5956-4e6e-9dbf-49f3e6e55a66", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -2986,7 +2986,7 @@ ], "version":"1.0", "siteId":"0c0aef1d-0ab9-4660-b216-649c4fe2b7a7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -2994,7 +2994,7 @@ ], "version":"1.0", "siteId":"eda30e7b-0e67-4879-85bd-cfc30b0d9765", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3002,7 +3002,7 @@ ], "version":"1.0", "siteId":"16244588-f6da-4ef7-b329-87eed13902be", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3010,7 +3010,7 @@ ], "version":"1.0", "siteId":"a83421d0-cfe5-4318-85ee-a991d2cdd748", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3018,7 +3018,7 @@ ], "version":"1.0", "siteId":"dca266ec-80d9-4692-8782-1f1d3d7aed0a", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3026,7 +3026,7 @@ ], "version":"1.0", "siteId":"0d64a127-ae63-46f8-9b76-9d7d1502c6d4", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3034,7 +3034,7 @@ ], "version":"1.0", "siteId":"f5c31c72-6d56-456b-aefb-d7cc942e5b04", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3042,7 +3042,7 @@ ], "version":"1.0", "siteId":"67966786-b701-4099-8e1a-4191534f36d2", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3050,7 +3050,7 @@ ], "version":"1.0", "siteId":"89b128e0-3217-4f63-bf99-b202ec7c0103", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3058,7 +3058,7 @@ ], "version":"1.0", "siteId":"16b5e550-d288-4e11-94a6-baaa8e3d9c08", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3066,7 +3066,7 @@ ], "version":"1.0", "siteId":"8c57bcf3-b0e4-4f47-b45e-bbb9f32e2997", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3074,7 +3074,7 @@ ], "version":"1.0", "siteId":"be5fd8eb-dda4-4f38-b5ce-35d1d49151cc", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3082,7 +3082,7 @@ ], "version":"1.0", "siteId":"4996f8ef-8933-412e-b58b-2238ba860ec7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3090,7 +3090,7 @@ ], "version":"1.0", "siteId":"d44f3eca-a3dc-4ed1-a020-0ded43c78056", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3098,7 +3098,7 @@ ], "version":"1.0", "siteId":"fb5bbd30-3a01-4eaf-a24d-b0e75ff158c6", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3106,7 +3106,7 @@ ], "version":"1.0", "siteId":"ea574cd8-fa45-48ab-9944-83ed33537416", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3114,7 +3114,7 @@ ], "version":"1.0", "siteId":"ed089cbf-3622-492f-bf60-5baf6d0b3708", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3122,7 +3122,7 @@ ], "version":"1.0", "siteId":"47a127ae-92bd-49ec-aed0-aec8e2a31678", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3130,7 +3130,7 @@ ], "version":"1.0", "siteId":"625bcb2d-4e4a-4571-80e9-c5d2caad4ecf", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3138,7 +3138,7 @@ ], "version":"1.0", "siteId":"36d3230c-c6ce-44ae-8901-3b4a624883e6", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3146,7 +3146,7 @@ ], "version":"1.0", "siteId":"8ff6aa1d-089f-41e2-8e42-5cad97770e7d", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3154,7 +3154,7 @@ ], "version":"1.0", "siteId":"fa666989-76fb-4aa1-8caf-ad9dc6d08ef7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3217,7 +3217,7 @@ ], "version":"1.0", "siteId":"b497a0ab-3ab4-42fd-8921-2f45af587b98", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3225,7 +3225,7 @@ ], "version":"1.0", "siteId":"ef6944e0-72be-4d1d-8e29-1ca1ebcf8d98", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3233,7 +3233,7 @@ ], "version":"1.0", "siteId":"80be6b3f-2bb8-4711-ae59-f7a667eedb08", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3241,7 +3241,7 @@ ], "version":"1.0", "siteId":"7010b0ed-ae2b-41bd-977a-79b1628dd1b7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3249,7 +3249,7 @@ ], "version":"1.0", "siteId":"94f61603-5f1f-4b26-85dd-59355cd67632", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3257,7 +3257,7 @@ ], "version":"1.0", "siteId":"633a40de-b885-448c-bd84-dd1fef679fbe", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3265,7 +3265,7 @@ ], "version":"1.0", "siteId":"e3c898bc-a0d5-47b9-83c6-a48a88fa6fbe", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3375,7 +3375,7 @@ ], "version":"1.0", "siteId":"8a7ddd03-dddb-4a76-a079-56c3b45ab1ec", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3383,7 +3383,7 @@ ], "version":"1.0", "siteId":"c45259ff-0612-4fe7-907c-5987877892d9", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3391,7 +3391,7 @@ ], "version":"1.0", "siteId":"eb935311-f082-416e-a13c-08acdc6219c0", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3399,7 +3399,7 @@ ], "version":"1.0", "siteId":"78b8a15c-c112-4941-b00b-ceda2edb38f2", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3407,7 +3407,7 @@ ], "version":"1.0", "siteId":"212be018-cfb6-4041-9caa-d344385848b7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3415,7 +3415,7 @@ ], "version":"1.0", "siteId":"5e6d602a-4135-44ef-a5ae-8d9ee6056f3b", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3423,7 +3423,7 @@ ], "version":"1.0", "siteId":"6f4d01b1-d00c-4471-8aa2-28b7e99636ab", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3431,7 +3431,7 @@ ], "version":"1.0", "siteId":"bf561bf3-95d6-4da1-bf49-26887955fa2e", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3439,7 +3439,7 @@ ], "version":"1.0", "siteId":"80143381-187c-48fa-a356-15389aad4e9c", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3447,7 +3447,7 @@ ], "version":"1.0", "siteId":"d0484233-604a-4972-b010-42a0d44fe3d6", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3455,7 +3455,7 @@ ], "version":"1.0", "siteId":"caa9eb0d-618b-4d90-ac10-eb2a2d17e763", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3463,7 +3463,7 @@ ], "version":"1.0", "siteId":"21cc7dad-8c9e-4637-8f24-22ec417b9811", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3471,7 +3471,7 @@ ], "version":"1.0", "siteId":"3fbfb158-a429-41b3-a220-6a6286f93d16", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3479,7 +3479,7 @@ ], "version":"1.0", "siteId":"7002e28c-a309-454b-ac5d-a6a99d64bc20", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3487,7 +3487,7 @@ ], "version":"1.0", "siteId":"4a03cd04-41bb-4e3c-9a59-3f96637c27e7", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3495,7 +3495,7 @@ ], "version":"1.0", "siteId":"65eba291-ee04-43d2-bddb-a2cb2e7ff7d8", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3503,7 +3503,7 @@ ], "version":"1.0", "siteId":"398f4d42-d265-4233-8ec3-5e4ba73c9956", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3511,7 +3511,7 @@ ], "version":"1.0", "siteId":"0e238b6e-e390-4dae-8932-49ceb3376304", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3519,7 +3519,7 @@ ], "version":"1.0", "siteId":"9674054e-fd9e-49ed-8084-1ce9131d6781", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3527,7 +3527,7 @@ ], "version":"1.0", "siteId":"05d2d29c-3c23-478e-88ee-7ec60398634f", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" }, { "response":[ @@ -3535,7 +3535,7 @@ ], "version":"1.0", "siteId":"69f31d51-9e0d-48f4-8546-4935253f9a67", - "message":"Site doesn’t not have device member with given device family or serial number as input" + "message":"Site does not have device member with given device family or serial number as input" } ] }, From 4db6dbd322ec62b5d1d846d9963c214125ba177b Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Wed, 24 Jul 2024 14:37:07 +0530 Subject: [PATCH 093/119] Update the log message by including device ips in the failure message while adding the device in inventory. --- plugins/modules/inventory_intent.py | 26 +++++++++++++-- plugins/modules/inventory_workflow_manager.py | 32 +++++++++++++++---- 2 files changed, 48 insertions(+), 10 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index 507bb2d477..e4f8ec8c6d 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -819,6 +819,7 @@ def validate_input(self): self.msg = "Invalid parameters in playbook: {0}".format(invalid_params) self.log(self.msg, "ERROR") self.status = "failed" + self.result['response'] = self.msg return self self.validated_config = valid_temp @@ -1069,6 +1070,7 @@ def trigger_export_api(self, payload_params): else: self.msg = "Could not get the File ID so can't export device details in csv file" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return response @@ -1101,6 +1103,7 @@ def decrypt_and_read_csv(self, response, password): self.msg = "pyzipper is required for this module. Install pyzipper to use this functionality." self.log(self.msg, "CRITICAL") self.status = "failed" + self.result['response'] = self.msg return self snmp_protocol = self.config[0].get('snmp_priv_protocol', 'AES128') @@ -1121,6 +1124,7 @@ def decrypt_and_read_csv(self, response, password): self.msg = "Invalid SNMP protocol '{0}' specified for encryption.".format(snmp_protocol) self.log(self.msg, "ERROR") self.status = "failed" + self.result['response'] = self.msg return self # Create a PyZipper object with the password @@ -1163,6 +1167,7 @@ def export_device_details(self): self.status = "failed" self.msg = "Cannot export device details as no devices are specified in the playbook" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self try: @@ -1173,6 +1178,7 @@ def export_device_details(self): self.result['changed'] = False self.msg = "Could not find device UUIDs for exporting device details" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self # Now all device UUID get collected so call the export device list API @@ -1186,6 +1192,7 @@ def export_device_details(self): formatted_msg = ' '.join(line.strip() for line in detailed_msg.splitlines()) self.msg = formatted_msg self.log(formatted_msg, "INFO") + self.result['response'] = self.msg return self payload_params = { @@ -1345,6 +1352,7 @@ def resync_devices(self): else: self.msg = "Device resynced get failed." self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -1445,6 +1453,7 @@ def reboot_access_points(self): else: self.msg = "AP Device Rebooting get failed" self.log(self.msg, "ERROR") + self.result['response'] = self.msg break return self @@ -1486,6 +1495,7 @@ def handle_failed_provisioning(self, device_ip, execution_details, device_type): failure_reason = execution_details.get("failureReason", "Unknown failure reason") self.msg = "{0} Device Provisioning failed for {1} because of {2}".format(device_type, device_ip, failure_reason) self.log(self.msg, "WARNING") + self.result['response'] = self.msg def handle_provisioning_exception(self, device_ip, exception, device_type): """ @@ -1554,6 +1564,7 @@ def handle_all_failed_provision(self, device_type): self.status = "failed" self.msg = "{0} Device Provisioning failed for all devices".format(device_type) self.log(self.msg, "INFO") + self.result['response'] = self.msg def handle_partially_provisioned(self, provision_count, device_type): """ @@ -1738,6 +1749,7 @@ def get_wireless_param(self, prov_dict): self.status = "failed" self.msg = "Managed AP Location must be a floor" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self wireless_param[0]["dynamicInterfaces"] = [] @@ -1763,6 +1775,7 @@ def get_wireless_param(self, prov_dict): self.status = "failed" self.msg = "Device Host name is not present in the Cisco Catalyst Center" self.log(self.msg, "INFO") + self.result['response'] = self.msg return self response = response.get("response") @@ -2628,6 +2641,7 @@ def update_interface_detail_of_device(self, device_to_update): self.msg = """Failed to retrieve interface details or the 'id' is missing for the device with identifier '{0}' and interface '{1}'""".format(device_id[0], interface_name) self.log(self.msg, "WARNING") + self.result['response'] = self.msg return self interface_id = interface_details['id'] @@ -2699,6 +2713,7 @@ def update_interface_detail_of_device(self, device_to_update): self.status = "failed" self.msg = "Failed to update the interface because the 'update_interface_details' API returned an empty response." self.log(self.msg, "ERROR") + self.result['response'] = self.msg continue task_id = response.get('taskId') @@ -2721,6 +2736,7 @@ def update_interface_detail_of_device(self, device_to_update): else: self.msg = "Interface Updation get failed" self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -2772,9 +2788,9 @@ def check_managementip_execution_response(self, response, device_ip, new_mgmt_ip self.result['changed'] = True self.msg = """Device '{0}' present in Cisco Catalyst Center and new management ip '{1}' have been updated successfully""".format(device_ip, new_mgmt_ipaddress) - self.result['response'] = self.msg self.log(self.msg, "INFO") break + self.result['response'] = self.msg return self @@ -2941,6 +2957,7 @@ def get_diff_merged(self, config): Cisco Catalyst Center.""".format(str(device_not_available)) self.result['response'] = self.msg self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if self.config[0].get('update_mgmt_ipaddresslist'): @@ -2952,6 +2969,7 @@ def get_diff_merged(self, config): self.msg = """Unable to update the Management IP address because the device with IP '{0}' is not found in Cisco Catalyst Center.""".format(device_ip) self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self if self.config[0].get('update_interface_details'): @@ -3013,7 +3031,7 @@ def get_diff_merged(self, config): if not device_params['snmpROCommunity']: self.status = "failed" self.msg = "Required parameter 'snmpROCommunity' for adding device with snmmp version v2 is not present" - self.result['msg'] = self.msg + self.result['response'] = self.msg self.log(self.msg, "ERROR") return self else: @@ -3384,7 +3402,7 @@ def get_diff_merged(self, config): self.msg = """Unable to assign Global User Defined Field: No devices found in Cisco Catalyst Center. Please add devices to proceed.""" self.log(self.msg, "INFO") - self.result['changed'] = False + self.result['response'] = self.msg return self # Now add code for adding Global UDF to device with Id @@ -3476,6 +3494,7 @@ def get_diff_deleted(self, config): else: self.msg = "Global UDF deletion get failed." self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -3562,6 +3581,7 @@ def get_diff_deleted(self, config): else: self.msg = "Device '{0}' deletion get failed.".format(device_ip) self.log(self.msg, "ERROR") + self.result['response'] = self.msg break self.result['msg'].append(self.msg) diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index b423eac21c..7c89bcf319 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -818,6 +818,7 @@ def validate_input(self): self.msg = "Invalid parameters in playbook: {0}".format(invalid_params) self.log(self.msg, "ERROR") self.status = "failed" + self.result['response'] = self.msg return self self.validated_config = valid_temp @@ -916,6 +917,7 @@ def get_existing_devices_in_ccc(self): self.status = "failed" self.msg = "Error while fetching device details from Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "CRITICAL") + self.result['response'] = self.msg self.check_return_status() self.log("Devices present in Cisco Catalyst Center: {0}".format(str(existing_devices_in_ccc)), "DEBUG") @@ -1068,6 +1070,7 @@ def trigger_export_api(self, payload_params): else: self.msg = "Could not get the File ID so can't export device details in csv file" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return response @@ -1100,6 +1103,7 @@ def decrypt_and_read_csv(self, response, password): self.msg = "pyzipper is required for this module. Install pyzipper to use this functionality." self.log(self.msg, "CRITICAL") self.status = "failed" + self.result['response'] = self.msg return self snmp_protocol = self.config[0].get('snmp_priv_protocol', 'AES128') @@ -1120,6 +1124,7 @@ def decrypt_and_read_csv(self, response, password): self.msg = "Invalid SNMP protocol '{0}' specified for encryption.".format(snmp_protocol) self.log(self.msg, "ERROR") self.status = "failed" + self.result['response'] = self.msg return self # Create a PyZipper object with the password @@ -1162,6 +1167,7 @@ def export_device_details(self): self.status = "failed" self.msg = "Cannot export device details as no devices are specified in the playbook" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self try: @@ -1169,9 +1175,9 @@ def export_device_details(self): if not device_uuids: self.status = "failed" - self.result['changed'] = False self.msg = "Could not find device UUIDs for exporting device details" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self # Now all device UUID get collected so call the export device list API @@ -1185,6 +1191,7 @@ def export_device_details(self): formatted_msg = ' '.join(line.strip() for line in detailed_msg.splitlines()) self.msg = formatted_msg self.log(formatted_msg, "INFO") + self.result['response'] = self.msg return self payload_params = { @@ -1344,6 +1351,7 @@ def resync_devices(self): else: self.msg = "Device resynced get failed." self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -1444,6 +1452,7 @@ def reboot_access_points(self): else: self.msg = "AP Device Rebooting get failed" self.log(self.msg, "ERROR") + self.result['response'] = self.msg break return self @@ -1485,6 +1494,7 @@ def handle_failed_provisioning(self, device_ip, execution_details, device_type): failure_reason = execution_details.get("failureReason", "Unknown failure reason") self.msg = "{0} Device Provisioning failed for {1} because of {2}".format(device_type, device_ip, failure_reason) self.log(self.msg, "WARNING") + self.result['response'] = self.msg def handle_provisioning_exception(self, device_ip, exception, device_type): """ @@ -1553,6 +1563,7 @@ def handle_all_failed_provision(self, device_type): self.status = "failed" self.msg = "{0} Device Provisioning failed for all devices".format(device_type) self.log(self.msg, "INFO") + self.result['response'] = self.msg def handle_partially_provisioned(self, provision_count, device_type): """ @@ -1736,6 +1747,7 @@ def get_wireless_param(self, prov_dict): self.status = "failed" self.msg = "Managed AP Location must be a floor" self.log(self.msg, "ERROR") + self.result['response'] = self.msg return self wireless_param[0]["dynamicInterfaces"] = [] @@ -1987,8 +1999,8 @@ def mandatory_parameter(self, device_to_add_in_ccc): if mandatory_params_absent: self.status = "failed" self.msg = "Required parameters {0} for adding devices '{1}' are not present".format(str(mandatory_params_absent), str(device_to_add_in_ccc)) - self.result['msg'] = self.msg self.log(self.msg, "ERROR") + self.result['response'] = self.msg else: self.status = "success" self.msg = "Required parameters for adding the devices '{0}' to inventory are present.".format(str(device_to_add_in_ccc)) @@ -2621,6 +2633,7 @@ def update_interface_detail_of_device(self, device_to_update): self.msg = """Failed to retrieve interface details or the 'id' is missing for the device with identifier '{0}' and interface '{1}'""".format(device_id[0], interface_name) self.log(self.msg, "WARNING") + self.result['response'] = self.msg return self interface_id = interface_details['id'] @@ -2692,6 +2705,7 @@ def update_interface_detail_of_device(self, device_to_update): self.status = "failed" self.msg = "Failed to update the interface because the 'update_interface_details' API returned an empty response." self.log(self.msg, "ERROR") + self.result['response'] = self.msg continue task_id = response.get('taskId') @@ -2714,6 +2728,7 @@ def update_interface_detail_of_device(self, device_to_update): else: self.msg = "Interface Updation get failed" self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -2765,9 +2780,9 @@ def check_managementip_execution_response(self, response, device_ip, new_mgmt_ip self.result['changed'] = True self.msg = """Device '{0}' present in Cisco Catalyst Center and new management ip '{1}' have been updated successfully""".format(device_ip, new_mgmt_ipaddress) - self.result['response'] = self.msg self.log(self.msg, "INFO") break + self.result['response'] = self.msg return self @@ -3004,7 +3019,7 @@ def get_diff_merged(self, config): if not device_params['snmpROCommunity']: self.status = "failed" self.msg = "Required parameter 'snmpROCommunity' for adding device with snmmp version v2 is not present" - self.result['msg'] = self.msg + self.result['response'] = self.msg self.log(self.msg, "ERROR") return self else: @@ -3057,6 +3072,7 @@ def get_diff_merged(self, config): self.msg = "Device(s) '{0}' added to Cisco Catalyst Center".format(str(devices_to_add)) self.log(self.msg, "INFO") self.result['msg'] = self.msg + self.result['response'] = self.msg break self.msg = "Device(s) '{0}' already present in Cisco Catalyst Center".format(str(self.config[0].get("ip_address_list"))) self.log(self.msg, "INFO") @@ -3066,11 +3082,11 @@ def get_diff_merged(self, config): self.status = "failed" failure_reason = execution_details.get("failureReason") if failure_reason: - self.msg = "Device addition get failed because of {0}".format(failure_reason) + self.msg = "Device addition for the device(s) '{0}' get failed because of {1}.".format(device_to_add_in_ccc, failure_reason) else: - self.msg = "Device addition get failed" + self.msg = "Device addition get failed for the device(s): '{0}'.".format(device_to_add_in_ccc) self.log(self.msg, "ERROR") - self.result['msg'] = self.msg + self.result['response'] = self.msg break except Exception as e: @@ -3469,6 +3485,7 @@ def get_diff_deleted(self, config): else: self.msg = "Global UDF deletion get failed." self.log(self.msg, "ERROR") + self.result['response'] = self.msg break except Exception as e: @@ -3558,6 +3575,7 @@ def get_diff_deleted(self, config): else: self.msg = "Device '{0}' deletion get failed.".format(device_ip) self.log(self.msg, "ERROR") + self.result['response'] = self.msg break self.result['msg'].append(self.msg) From 72aa2acc379024c2e891bbf6444366886fc2765b Mon Sep 17 00:00:00 2001 From: Syed-khadeerahmed Date: Thu, 25 Jul 2024 15:43:42 +0530 Subject: [PATCH 094/119] integration test cases added --- .../defaults/main.yml | 2 + .../meta/main.yml | 1 + .../tasks/main.yml | 34 +++ .../tests/test_user_role_workflow_manager.yml | 220 ++++++++++++++++++ .../vars/vars_user_role_workflow_manager.yml | 64 +++++ 5 files changed, 321 insertions(+) create mode 100644 tests/integration/ccc_user_role_workflow_manager/defaults/main.yml create mode 100644 tests/integration/ccc_user_role_workflow_manager/meta/main.yml create mode 100644 tests/integration/ccc_user_role_workflow_manager/tasks/main.yml create mode 100644 tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml create mode 100644 tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml diff --git a/tests/integration/ccc_user_role_workflow_manager/defaults/main.yml b/tests/integration/ccc_user_role_workflow_manager/defaults/main.yml new file mode 100644 index 0000000000..5f709c5aac --- /dev/null +++ b/tests/integration/ccc_user_role_workflow_manager/defaults/main.yml @@ -0,0 +1,2 @@ +--- +testcase: "*" diff --git a/tests/integration/ccc_user_role_workflow_manager/meta/main.yml b/tests/integration/ccc_user_role_workflow_manager/meta/main.yml new file mode 100644 index 0000000000..32cf5dda7e --- /dev/null +++ b/tests/integration/ccc_user_role_workflow_manager/meta/main.yml @@ -0,0 +1 @@ +dependencies: [] diff --git a/tests/integration/ccc_user_role_workflow_manager/tasks/main.yml b/tests/integration/ccc_user_role_workflow_manager/tasks/main.yml new file mode 100644 index 0000000000..d842bc1747 --- /dev/null +++ b/tests/integration/ccc_user_role_workflow_manager/tasks/main.yml @@ -0,0 +1,34 @@ +--- +- name: collect ccc test cases + find: + paths: "{{ role_path }}/tests" + patterns: "{{ testcase }}.yml" + connection: local + register: ccc_cases + tags: sanity + +- debug: + msg: "CCC Cases: {{ ccc_cases }}" + +- set_fact: + test_cases: + files: "{{ ccc_cases.files }}" + tags: sanity + +- debug: + msg: "Test Cases: {{ test_cases }}" + +- name: set test_items + set_fact: + test_items: "{{ test_cases.files | map(attribute='path') | list }}" + tags: sanity + +- debug: + msg: "Test Items: {{ test_items }}" + +- name: run test cases (connection=httpapi) + include_tasks: "{{ test_case_to_run }}" + loop: "{{ test_items }}" + loop_control: + loop_var: test_case_to_run + tags: sanity diff --git a/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml b/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml new file mode 100644 index 0000000000..a00147a168 --- /dev/null +++ b/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml @@ -0,0 +1,220 @@ +--- +- debug: msg="Starting user role workflow manager test" +- debug: msg="Role Path {{ role_path }}" + +- block: + - name: Load vars and declare dnac vars + include_vars: + file: "{{ role_path }}/vars/vars_user_role_workflow_manager.yml" + name: vars_map + vars: + dnac_login: &dnac_login + dnac_host: "{{ dnac_host }}" + dnac_username: "{{ dnac_username }}" + dnac_password: "{{ dnac_password }}" + dnac_verify: "{{ dnac_verify }}" + dnac_port: "{{ dnac_port }}" + dnac_version: "{{ dnac_version }}" + dnac_debug: "{{ dnac_debug }}" + dnac_log: true + dnac_log_level: DEBUG + + # - debug: + # msg: "{{ vars_map. }}" + # - debug: + # msg: "{{ vars_map. }}" + # - debug: + # msg: "{{ vars_map. }}" + +############################################# +# Clean Up # +############################################# + + - name: Delete user + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: deleted + config: + user_details: + - "{{ item }}" + loop: "{{ vars_map.delete_user }}" + register: result_deleted_user + + - name: Delete role + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: deleted + config: + role_details: + - "{{ item }}" + loop: "{{ vars_map.delete_role }}" + register: result_deleted_role + +############################################# +# CREATE USER # +############################################# + + - name: Create user + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: merged + config: + user_details: + - "{{ item }}" + loop: "{{ vars_map.create_user }}" + register: result_created_user + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_created_user.results }}" + # when: result_created_user is defined + + - name: Assert create user + assert: + that: + - item.changed == true + - "'User created successfully' in item.response.operation.response.response.message" + loop: "{{ result_created_user.results }}" + when: result_created_user is defined + + +############################################# +# CREATE ROLE # +############################################# + + - name: Create role + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: merged + config: + role_details: + - "{{ item }}" + loop: "{{ vars_map.create_role }}" + register: result_created_role + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_created_role.results }}" + # when: result_created_role is defined + + - name: Assert create role + assert: + that: + - item.changed == true + - "'created successfully' in item.response.operation.response.response.message" + loop: "{{ result_created_role.results }}" + when: result_created_role is defined + +############################################# +# UPDATE USER # +############################################# + + - name: Update user + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: merged + config: + user_details: + - "{{ item }}" + loop: "{{ vars_map.update_user }}" + register: result_updated_user + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_updated_user.results }}" + # when: result_updated_user is defined + + - name: Assert update user + assert: + that: + - item.changed == true + - "'Updated user successfully' in item.response.operation.response.response.message" + loop: "{{ result_updated_user.results }}" + when: result_updated_user is defined + +############################################# +# UPDATE ROLE # +############################################# + + - name: Update role + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: merged + config: + role_details: + - "{{ item }}" + loop: "{{ vars_map.update_role }}" + register: result_updated_role + + - name: Debug item + debug: + var: item + loop: "{{ result_updated_role.results }}" + when: result_updated_role is defined + + - name: Assert update role + assert: + that: + - item.changed == true + - "'updated successfully' in item.response.operation.response.response.message" + loop: "{{ result_updated_role.results }}" + when: result_updated_role is defined + +############################################# +# DELETE USER # +############################################# + + - name: Delete user + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: deleted + config: + user_details: + - "{{ item }}" + loop: "{{ vars_map.delete_user }}" + register: result_deleted_user + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_deleted_user.results }}" + # when: result_deleted_user is defined + + - name: Assert delete user + assert: + that: + - item.changed == true + - "'Deleted user successfully' in item.response.users_operation.response.response.message" + loop: "{{ result_deleted_user.results }}" + when: result_deleted_user is defined + +############################################# +# DELETE ROLE # +############################################# + + - name: Delete role + cisco.dnac.user_role_workflow_manager: + <<: *dnac_login + state: deleted + config: + role_details: + - "{{ item }}" + loop: "{{ vars_map.delete_role }}" + register: result_deleted_role + + # - name: Debug item + # debug: + # var: item + # loop: "{{ result_deleted_role.results }}" + # when: result_deleted_role is defined + + - name: Assert delete role + assert: + that: + - item.changed == true + - "'deleted successfully' in item.response.role_operation.response.response.message" + loop: "{{ result_deleted_role.results }}" + when: result_deleted_role is defined diff --git a/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml b/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml new file mode 100644 index 0000000000..bd79553fc3 --- /dev/null +++ b/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml @@ -0,0 +1,64 @@ +--- +create_user: + - first_name: "syed" + last_name: "Khadeer" + username: "syedkhadeer" + email: "syedkhadeer@example.com" + password: "Syed@123" + role_list: ["Super-Admin-Role"] + +create_role: + - role_name: "Test_Role_1" + description: "Role creation" + assurance: + - overall: "read" + troubleshooting_tools: "write" + network_analytics: + - overall: "deny" + network_design: + - overall: "deny" + image_repository: "read" + network_provision: + - overall: "read" + eox: "write" + image_update: "read" + inventory_management: + - overall: "write" + port_management: "read" + network_services: + - overall: "deny" + bonjour: "Write" + platform: + - overall: "deny" + bundles: "read" + security: + - overall: "deny" + ip_based_access_control: "read" + security_advisories: "deny" + system: + - overall: "deny" + machine_reasoning: "write" + system_management: "deny" + utilities: + - overall: "deny" + audit_log: "read" + +update_user: + - first_name: "syed" + last_name: "Khadeer-ahmed" + username: "syedkhadeer" + role_list: ["Observer-Role"] + +update_role: + - role_name: "Test_Role_1" + description: "Role updation" + network_analytics: + - overall: "write" + network_design: + - overall: "write" + +delete_user: + - username: "syedkhadeer" + +delete_role: + - role_name: "Test_Role_1" From 93aaf7d2e82179d3a4a1d9a85a3cf768a08ae16d Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Thu, 25 Jul 2024 18:59:38 +0530 Subject: [PATCH 095/119] Completed unit, integration, and sanity testing, and initial code review. --- playbooks/user_role_workflow_manager.yml | 64 - plugins/module_utils/dnac.py | 3 +- plugins/modules/user_role_workflow_manager.py | 1522 ++++++++--------- .../tests/test_user_role_workflow_manager.yml | 24 - .../vars/vars_user_role_workflow_manager.yml | 24 +- tests/unit/modules/dnac/dnac_module.py | 139 +- .../fixtures/user_role_workflow_manager.json | 1473 ++++++++++++++++ .../dnac/test_user_role_workflow_manager.py | 811 +++++++++ 8 files changed, 2987 insertions(+), 1073 deletions(-) create mode 100644 tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json create mode 100644 tests/unit/modules/dnac/test_user_role_workflow_manager.py diff --git a/playbooks/user_role_workflow_manager.yml b/playbooks/user_role_workflow_manager.yml index 094a5858ea..32e2993e38 100644 --- a/playbooks/user_role_workflow_manager.yml +++ b/playbooks/user_role_workflow_manager.yml @@ -69,67 +69,3 @@ utilities: - overall: "deny" audit_log: "read" - - # role_details: - # - role_name: "Test_Role_1" - # description: "Default role creation" - # assurance: - # - overall: "write" - # monitoring_and_troubleshooting: "write" - # monitoring_settings: "write" - # troubleshooting_tools: "deny" - # network_analytics: - # - data_access: "read" - # network_design: - # - overall: "write" - # advanced_network_settings: "write" - # image_repository: "write" - # network_hierarchy: "deny" - # network_profiles: "read" - # network_settings: "deny" - # virtual_network: "read" - # network_provision: - # - overall: "write" - # compliance: "write" - # eox: "write" - # image_update: "deny" - # inventory_management: - # - overall: "write" - # device_configuration: "write" - # discovery: "read" - # network_device: "write" - # port_management: "deny" - # topology: "write" - # license: "write" - # network_telemetry: "write" - # pnp: "read" - # provision: "deny" - # network_services: - # - overall: "write" - # app_hosting: "write" - # bonjour: "write" - # stealthwatch: "deny" - # umbrella: "write" - # platform: - # - overall: "write" - # apis: "write" - # bundles: "deny" - # events: "read" - # reports: "write" - # security: - # - overall: "write" - # group_based_policy: "read" - # ip_based_access_control: "read" - # security_advisories: "deny" - # system: - # - overall: "write" - # machine_reasoning: "read" - # system_management: "deny" - # utilities: - # - overall: "write" - # audit_log: "read" - # event_viewer: "read" - # network_reasoner: "write" - # remote_device_support: "write" - # scheduler: "write" - # search: "write" diff --git a/plugins/module_utils/dnac.py b/plugins/module_utils/dnac.py index 1d4b804cd0..4c8142dacf 100644 --- a/plugins/module_utils/dnac.py +++ b/plugins/module_utils/dnac.py @@ -78,9 +78,10 @@ def __init__(self, module): self.logger = logging.getLogger('logger') DnacBase.__is_log_init = True self.log('Logging configured and initiated', "DEBUG") - elif not self.dnac_log: + else: # If dnac_log is False, return an empty logger self.logger = logging.getLogger('empty_logger') + self.logger.addHandler(logging.NullHandler()) self.log('Cisco Catalyst Center parameters: {0}'.format(dnac_params), "DEBUG") self.supported_states = ["merged", "deleted", "replaced", "overridden", "gathered", "rendered", "parsed"] diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index 4f1812fb48..3e2362ec82 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -5,15 +5,15 @@ from __future__ import absolute_import, division, print_function __metaclass__ = type -__author__ = ("Ajith Andrew J, Syed khadeer Ahmed") +__author__ = ("Ajith Andrew J, Syed khadeer Ahmed, Madhan Sankaranarayanan") DOCUMENTATION = r""" --- module: user_role_workflow_manager -short_description: Resource module for managing users and roles in Cisco Catalyst Center +short_description: Resource module for managing users and roles in Cisco Catalyst Center. description: - - Manages operations to create, update, and delete users and roles in Cisco Catalyst Center - - Provides APIs to create, update, and delete users and roles + - Manages operations to create, update, and delete users and roles in Cisco Catalyst Center. + - Provides APIs to create, update, and delete users and roles. version_added: "6.17.0" extends_documentation_fragment: - cisco.dnac.workflow_manager_params @@ -21,123 +21,130 @@ - Ajith Andrew J (@ajithandrewj) - Syed Khadeer Ahmed (@syed-khadeerahmed) - Rangaprabhu Deenadayalu (@rangaprabha-d) + - Madhan Sankaranarayanan (@madhansansel) options: config_verify: - description: Set to True to verify the Cisco Catalyst Center after applying the playbook config + description: Set to True to verify the Cisco Catalyst Center after applying the playbook config. type: bool default: False state: - description: The state of Cisco Catalyst Center after module completion + description: The state of Cisco Catalyst Center after module completion. type: str choices: ["merged", "deleted"] default: merged config: - description: Dict of user or role details being managed + description: A dictionary containing the configuration details for users or roles. type: dict required: true suboptions: user_details: - description: Manages the user details + description: Manages the configuration details for user accounts. type: list elements: dict suboptions: username: - description: The username for the user's account + description: The username associated with the user account. type: str first_name: - description: The first name of the user + description: The first name of the user. type: str last_name: - description: The last name of the user + description: The last name of the user. type: str email: description: - - The email address of the user (e.g., syedkhadeerahmed@example.com) - - Used to fetch user data if the username is forgotten - - Required for user deletion if the username is forgotten + - The email address of the user (e.g., syedkhadeerahmed@example.com). + - Used to fetch user data if the username is forgotten. + - Required for user deletion if the username is forgotten. type: str password: description: - - The password for the user's account. Must contain at least one special character, - one capital letter, one lowercase letter, and a minimum length of 15 characters - - Required for user creation + - The password for the user account, which must adhere to specified complexity requirements. + - Must contain at least one special character, one capital letter, one lowercase letter, + and a minimum length of 15 characters. + - Required for creating a new user account. type: str role_list: description: - - Default Role "Observer-role" - - A role name assigned to the user. It must match exactly with the role in Cisco Catalyst Center - - Required for user creation and updates + - A list of role names to be assigned to the user. If no role is specified, the default role will be "OBSERVER-ROLE". + - The role names must match with those defined in the Cisco Catalyst Center. + - The default roles present in the Cisco Catalyst Center are "SUPER-ADMIN-ROLE", "NETWORK-ADMIN-ROLE", "OBSERVER-ROLE". + - SUPER-ADMIN-ROLE grants Full access, including user management. + - NETWORK-ADMIN-ROLE grants Full network access, no system functions. + - OBSERVER-ROLE grants view-only access, no configuration or control functions. type: list elements: str role_details: - description: Manages the role details + description: Manages the configuration details for roles. type: list elements: dict suboptions: role_name: - description: Name of the role + description: The name of the role to be managed. type: str description: - description: Description for the role + description: A brief description of the role's purpose and scope. type: str assurance: - description: Assure consistent service levels with complete visibility across all aspects of your network + description: Ensure consistent service levels with complete visibility across all aspects of the network. choices: ["deny", "read", "write"] default: "read" suboptions: overall: - description: Provides the same choice for all sub-parameters + description: Set the same access level for all sub-parameters. choices: ["deny", "read", "write"] default: "read" monitoring_and_troubleshooting: description: - - Monitor and manage the health of your network with issue troubleshooting - and remediation, proactive network monitoring, and insights driven by AI Network Analytics + - Monitor and manage network health, troubleshoot issues, and perform remediation. + - Includes proactive network monitoring and AI-driven insights. choices: ["deny", "read", "write"] default: "read" type: str monitoring_settings: description: - - Configure and manage issues. Update network, client, and application health thresholds - - You must have at least Read permission on Monitoring and Troubleshooting + - Configure and manage health thresholds for the network, clients, and applications. + - Requires at least 'read' permission for Monitoring and Troubleshooting. choices: ["deny", "read", "write"] default: "read" type: str troubleshooting_tools: description: - - Create and manage sensor tests. Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients - - You must have at least Read permission on Monitoring and Troubleshooting + - Create and manage sensor tests. + - Schedule on-demand forensic packet captures (Intelligent Capture) for troubleshooting clients. + - Requires at least 'read' permission for Monitoring and Troubleshooting. choices: ["deny", "read", "write"] default: "read" type: str network_analytics: - description: Manage network analytics-related components + description: Manage components related to network analytics. suboptions: overall: - description: Provides the same choice for all sub-parameters + description: Set the same access level for all sub-parameters. choices: ["deny", "read", "write"] default: "read" data_access: description: - - Enable access to query engine APIs. Control functions such as global search, rogue management, and aWIPS - - Setting the permission to Deny affects Search and Assurance functionality + - Enable access to query engine APIs. + - Manage functions such as global search, rogue management, and aWIPS. + - Setting this to 'deny' affects Search and Assurance functionality. choices: ["deny", "read", "write"] default: "read" type: str network_design: - description: Set up the network hierarchy, update your software image repository, - and configure network profiles and settings for managing your sites and network devices + description: Set up the network hierarchy, update the software image repository, + and configure network profiles and settings for managing sites and network devices. suboptions: overall: - description: Provides the same choice for all sub-parameters + description: Set the same access level for all sub-parameters. choices: ["deny", "read", "write"] default: "read" advanced_network_settings: description: - - Update network settings, such as global device credentials, authentication and policy servers, - certificates, trustpool, cloud access keys, Stealthwatch, Umbrella, and data anonymization - - Export the device inventory and its credentials - - To complete this task, you must have Read permission on Network Settings + - Update network settings, including global device credentials, authentication and policy servers, certificates, + trustpool, cloud access keys, stealthwatch, umbrella, and data anonymization. + - Export the device inventory and its credentials. + - Requires at least 'read' permission on Network Settings. choices: ["deny", "read", "write"] default: "read" type: str @@ -151,16 +158,16 @@ network_profiles: description: - Create network profiles for routing, switching, and wireless. Assign profiles to sites. - This role includes Template Editor, Tagging, Model Config Editor, and Authentication Template. - - To create SSIDs, you must have Write permission on Network Settings. + - Includes roles such as template editor, tagging, model config editor, and authentication template. + - To create SSIDs, 'write' permission on network settings is required. choices: ["deny", "read", "write"] default: "read" type: str network_settings: description: - - Common site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. - - Users with this role can add an SFTP server and modify the Network Resync Interval in System > Settings. - - To create wireless profiles, you must have Write permission on Network Profiles. + - Manage common site-wide network settings such as AAA, NTP, DHCP, DNS, Syslog, SNMP, and Telemetry. + - Users in this role can add an SFTP server and adjust the Network Resync Interval found under Systems > Settings. + - To create wireless profiles, 'write' permission on Network Profiles is required. choices: ["deny", "read", "write"] default: "read" type: str @@ -171,10 +178,10 @@ default: "read" type: str network_provision: - description: Configure, upgrade, provision, and manage your network devices. + description: Configure, upgrade, provision, and manage network devices. suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str @@ -184,26 +191,24 @@ default: "read" type: str exo: - description: Scan the network for details on publicly announced information pertaining to the End of Life, End of Sales, - or End of Support of the hardware and software in your network. + description: Scan the network for End of Life, End of Sales, or End of Support information for hardware and software. choices: ["deny", "read", "write"] default: "read" type: str image_update: - description: Upgrade software images on devices that don't match the Golden Image settings after a complete upgrade lifecycle + description: Upgrade software images on devices that do not match the Golden Image settings after a complete upgrade lifecycle. choices: ["deny", "read", "write"] default: "read" type: str inventory_management: description: - - Discover, add, replace, or delete devices on your network while managing device attributes and configuration properties. - - To replace a device, you must have Write permission. - - Network Provision > PnP. + - Discover, add, replace, or delete devices while managing device attributes and configuration properties. + - To replace a device, 'write' permission is required for pnp under network provision. type: list elements: dict suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str @@ -213,12 +218,12 @@ default: "read" type: str discovery: - description: Display the running configuration of a device. + description: Discover new devices on the network. choices: ["deny", "read", "write"] default: "read" type: str network_device: - description: Add devices from Inventory, view device details, and perform device-level actions. + description: Add devices from inventory, view device details, and perform device-level actions. choices: ["deny", "read", "write"] default: "read" type: str @@ -229,39 +234,40 @@ type: str topology: description: - - Display network device and link connectivity. Manage device roles, tag devices, customize the display, and save custom topology layouts. - - To view the SD-Access Fabric window, you must have at least Read permission on Network Provision > Inventory Management > Topology. + - Display the network device and link connectivity. + - Manage device roles, tag devices, customize the display, and save custom topology layouts. + - To view the SD-Access Fabric window, at least 'read' permission on "Network Provision > Inventory Management > Topology" is required. choices: ["deny", "read", "write"] default: "read" type: str license: description: - - Unified view of your software and network assets relative to license usage and compliance. - - The role also controls permissions for cisco.com and Smart accounts. + - Unified view of software and network assets related to license usage and compliance. + - Also controls permissions for cisco.com and Smart accounts. choices: ["deny", "read", "write"] default: "read" type: str network_telemetry: description: - Enable or disable the collection of application telemetry from devices. - - Configure the telemetry settings associated with the assigned site. - - Configure other settings like wireless service assurance and controller certificates. - - To enable or disable network telemetry, you must have Write permission on Provision. + - Configure telemetry settings for the assigned site. + - Configure additional settings such as wireless service assurance and controller certificates. + - To enable or disable network telemetry, 'write' permission on Provision is required. choices: ["deny", "read", "write"] default: "read" type: str pnp: - description: Automatically onboard new devices, assign them to sites, and configure them with site-specific contextual settings. + description: Automatically onboard new devices, assign them to sites, and configure them with site-specific settings. choices: ["deny", "read", "write"] default: "read" type: str provision: description: - - Provision devices with the site-specific settings and policies that are configured for the network. - - This role includes Fabric, Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, + - Provision devices with site-specific settings and network policies. + - Includes roles such as Fabric, Application Policy, Application Visibility, Cloud, Site-to-Site VPN, Network/Application Telemetry, Stealthwatch, Sync Start vs Run Configuration, and Umbrella provisioning. - - On the main dashboards for rogue and aWIPS, you can enable or disable certain actions, including rogue containment. - - To provision devices, you must have Write permission on Network Design and Network Provision. + - On the main dashboards for rogue and aWIPS, certain actions, including rogue containment, can be enabled or disabled. + - To provision devices, 'write' permission on Network Design and Network Provision is required. choices: ["deny", "read", "write"] default: "read" type: str @@ -270,7 +276,7 @@ default: "read" suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str @@ -280,29 +286,29 @@ default: "read" type: str bonjour: - description: Enable the Wide Area Bonjour service across your network to enable policy-based service discovery. + description: Enable the Wide Area Bonjour service to facilitate policy-based service discovery across the network. choices: ["deny", "read", "write"] default: "read" type: str stealthwatch: description: - - Configure network elements to send data to Cisco Stealthwatch to detect and mitigate threats, even in encrypted traffic. - - To provision Stealthwatch, you must have Write permission on the following components. - - Network Design > Network Settings - - Network Provision > Provision - - Network Services > Stealthwatch - - Network Design > Advanced Settings + - Configure network elements to send data to Cisco Stealthwatch for threat detection and mitigation, including encrypted traffic. + - To provision Stealthwatch, 'write' permission is required for the following components. + - Network Design > Network Settings. + - Network Provision > Provision. + - Network Services > Stealthwatch. + - Network Design > Advanced Settings. choices: ["deny", "read", "write"] default: "read" type: str umbrella: description: - - Configure network elements to use Cisco Umbrella as the first line of defense against cybersecurity threats. - - To provision Umbrella, you must have Write permission on the following components - - Network Design > Network Settings - - Network Provision > Provision - - Network Provision > Scheduler - - Network Services > Umbrella + - Configure network elements to use Cisco Umbrella as a first line of defense against cybersecurity threats. + - To provision Umbrella, 'write' permission is required for the following components. + - Network Design > Network Settings. + - Network Provision > Provision. + - Network Provision > Scheduler. + - Network Services > Umbrella. choices: ["deny", "read", "write"] default: "read" type: str @@ -311,12 +317,12 @@ default: "deny" suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str apis: - description: Drive value by accessing Cisco Catalyst Center through REST APIs. + description: Access Cisco Catalyst Center through REST APIs to drive value. choices: ["deny", "read", "write"] default: "deny" type: str @@ -327,16 +333,16 @@ type: str events: description: - - Subscribe to get notified in near real time about network and system events of interest and initiate corrective actions. - - You can configure email and syslog logs in System > Settings > Destinations. + - Subscribe to near real-time notifications for network and system events of interest. + - Configure email and syslog logs in System > Settings > Destinations. choices: ["deny", "read", "write"] default: "deny" type: str reports: description: - - Generate reports using predefined reporting templates for all aspects of your network. - - Generate reports for rogue devices and for aWIPS. - - You can configure webhooks in System > Settings > Destinations. + - Generate reports using predefined templates for all aspects of the network. + - Generate reports for rogue devices and aWIPS. + - Configure webhooks in System > Settings > Destinations. choices: ["deny", "read", "write"] default: "deny" type: str @@ -345,7 +351,7 @@ default: "read" suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str @@ -362,18 +368,17 @@ default: "read" type: str security_advisories: - description: Scan the network for security advisories. Review and understand the impact of published - Cisco security advisories that may affect your network. + description: Scan the network for security advisories. Review and understand the impact of published Cisco security advisories. choices: ["deny", "read", "write"] default: "read" type: str system: - description: Centralized administration of Cisco Catalyst Center, which includes configuration management, + description: Centralized administration of Cisco Catalyst Center, including configuration management, network connectivity, software upgrades, and more. default: "read" suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] default: "read" type: str @@ -385,7 +390,7 @@ type: str system_management: description: - - Manage core system functionality and connectivity settings. Manage user roles and configure external authentication. + - Manage core system functionality and connectivity settings, user roles, and external authentication. - This role includes Cisco Credentials, Integrity Verification, Device EULA, HA, Integration Settings, Disaster Recovery, Debugging Logs, Telemetry Collection, System EULA, IPAM, vManage Servers, Cisco AI Analytics, Backup & Restore, and Data Platform. choices: ["deny", "read", "write"] @@ -395,7 +400,7 @@ description: One-stop-shop productivity resource for the most commonly used troubleshooting tools and services. suboptions: overall: - description: It gives the same choice for all sub-parameters. + description: Provides the same choice for all sub-parameters. choices: ["deny", "read", "write"] type: str audit_log: @@ -411,8 +416,8 @@ network_reasoner: description: - Allow the Cisco support team to remotely troubleshoot the network devices managed by Cisco Catalyst Center. - - With this role enabled, an engineer from the Cisco Technical Assistance Center TAC can connect remotely to a - customer's Cisco Catalyst Center setup for troubleshooting purposes. + - Enables an engineer from the Cisco Technical Assistance Center (TAC) to connect remotely to a customer's Cisco Catalyst Center + setup for troubleshooting. choices: ["deny", "read", "write"] default: "read" type: str @@ -422,14 +427,14 @@ default: "read" type: str scheduler: - description: Integrated with other back-end services, scheduler lets you run, schedule, and monitor network tasks and - activities such as deploy policies, provision, or upgrade the network. + description: Run, schedule, and monitor network tasks and activities such as deploying policies, provisioning, + or upgrading the network, integrated with other back-end services. choices: ["deny", "read", "write"] default: "read" type: str search: - description: Search for various objects in Cisco Catalyst Center, such as sites, network devices, clients, applications, - policies, settings, tags, menu items, and more. + description: Search for various objects in Cisco Catalyst Center, including sites, + network devices, clients, applications, policies, settings, tags, menu items, and more. choices: ["deny", "read", "write"] default: "read" type: str @@ -467,13 +472,13 @@ dnac_task_poll_interval: 1 state: merged config: - - user_details: - - username: "ajithandrewj" - first_name: "ajith" - last_name: "andrew" - email: "ajith.andrew@example.com" - password: "Ajith@123" - role_list: ["SUPER-ADMIN-ROLE"] + user_details: + - username: "ajithandrewj" + first_name: "ajith" + last_name: "andrew" + email: "ajith.andrew@example.com" + password: "Ajith@123" + role_list: ["SUPER-ADMIN-ROLE"] - name: Update a user for first name, last name, email, and role list cisco.dnac.user_role_workflow_manager: @@ -491,12 +496,12 @@ dnac_task_poll_interval: 1 state: merged config: - - user_details: - - username: "ajithandrewj" - first_name: "ajith" - last_name: "andrew" - email: "ajith.andrew@example.com" - role_list: ["SUPER-ADMIN-ROLE"] + user_details: + - username: "ajithandrewj" + first_name: "ajith" + last_name: "andrew" + email: "ajith.andrew@example.com" + role_list: ["SUPER-ADMIN-ROLE"] - name: Update a user for role list cisco.dnac.user_role_workflow_manager: @@ -514,11 +519,11 @@ dnac_task_poll_interval: 1 state: merged config: - - user_details: - - username: "ajithandrewj" - role_list: ["NETWORK-ADMIN-ROLE"] + user_details: + - username: "ajithandrewj" + role_list: ["NETWORK-ADMIN-ROLE"] -- name: Delete a user +- name: Delete a user using username or email address cisco.dnac.user_role_workflow_manager: dnac_host: "{{ dnac_host }}" dnac_username: "{{ dnac_username }}" @@ -534,9 +539,8 @@ dnac_task_poll_interval: 1 state: merged config: - - user_details: - username: "ajithandrewj" - email: "ajith.andrew@example.com" + user_details: + username: "ajithandrewj" - name: Create a role with all params cisco.dnac.user_role_workflow_manager: @@ -550,58 +554,59 @@ dnac_log: True dnac_log_level: DEBUG config_verify: True - role_based_access_control: - - role_name: "role_name" - description: "role_description" - assurance: - - monitoring_and_troubleshooting: "write" - monitoring_settings: "read" - troubleshooting_tools: "deny" - network_analytics: - data_access: "write" - network_design: - - advanced_network_settings: "deny" - image_repository: "deny" - network_hierarchy: "deny" - network_profiles: "write" - network_settings: "write" - virtual_network: "read" - network_provision: - - compliance: "deny" - image_update: "write" - inventory_management: - - device_configuration: "write" - discovery: "deny" - network_device: "read" - port_management: "write" - topology: "write" - license: "write" - network_telemetry: "write" - pnp: "deny" - provision: "read" - network_services: - - app_hosting: "deny" - bonjour: "write" - stealthwatch: "read" - umbrella: "deny" - platform: - - apis: "write" - bundles: "write" - events: "write" - reports: "read" - security: - - group_based_policy: "read" - ip_based_access_control: "write" - security_advisories: "write" - system: - - machine_reasoning: "read" - system_management: "write" - utilities: - - audit_log: "read" - event_viewer: "deny" - network_reasoner: "write" - scheduler: "read" - search: "write" + config: + role_details: + - role_name: "role_name" + description: "role_description" + assurance: + - monitoring_and_troubleshooting: "write" + monitoring_settings: "read" + troubleshooting_tools: "deny" + network_analytics: + data_access: "write" + network_design: + - advanced_network_settings: "deny" + image_repository: "deny" + network_hierarchy: "deny" + network_profiles: "write" + network_settings: "write" + virtual_network: "read" + network_provision: + - compliance: "deny" + image_update: "write" + inventory_management: + - device_configuration: "write" + discovery: "deny" + network_device: "read" + port_management: "write" + topology: "write" + license: "write" + network_telemetry: "write" + pnp: "deny" + provision: "read" + network_services: + - app_hosting: "deny" + bonjour: "write" + stealthwatch: "read" + umbrella: "deny" + platform: + - apis: "write" + bundles: "write" + events: "write" + reports: "read" + security: + - group_based_policy: "read" + ip_based_access_control: "write" + security_advisories: "write" + system: + - machine_reasoning: "read" + system_management: "write" + utilities: + - audit_log: "read" + event_viewer: "deny" + network_reasoner: "write" + scheduler: "read" + search: "write" - name: Create a role for assurance cisco.dnac.user_role_workflow_manager: @@ -615,12 +620,13 @@ dnac_log: True dnac_log_level: DEBUG config_verify: True - role_based_access_control: - - role_name: "role_name" - description: "role_description" - assurance: - - overall: "write" - monitoring_and_troubleshooting: "read" + config: + role_details: + - role_name: "role_name" + description: "role_description" + assurance: + - overall: "write" + monitoring_and_troubleshooting: "read" - name: Create a role for network provision cisco.dnac.user_role_workflow_manager: @@ -634,19 +640,20 @@ dnac_log: True dnac_log_level: DEBUG config_verify: True - role_based_access_control: - - role_name: "role_name" - description: "role_description" - network_provision: - - compliance: "deny" - image_update: "write" - inventory_management: - - overall: "read" - device_configuration: "write" - license: "write" - network_telemetry: "write" - pnp: "deny" - provision: "read" + config: + role_details: + - role_name: "role_name" + description: "role_description" + network_provision: + - compliance: "deny" + image_update: "write" + inventory_management: + - overall: "read" + device_configuration: "write" + license: "write" + network_telemetry: "write" + pnp: "deny" + provision: "read" - name: Update a role for assurance and platform cisco.dnac.user_role_workflow_manager: @@ -687,8 +694,8 @@ dnac_task_poll_interval: 1 state: merged config: - - role_details: - rolename: "role_name" + role_details: + - rolename: "role_name" """ RETURN = r""" @@ -849,7 +856,6 @@ class UserandRole(DnacBase): """Class containing member attributes for user workflow_manager module""" - def __init__(self, module): super().__init__(module) self.result["response"] = [] @@ -864,6 +870,7 @@ def validate_input_yml(self, user_role_details): to ensure it adheres to the expected structure and data types based on input. Parameters: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - user_role_details (list): Contains user details or role details according to the yml file. Returns: The method returns an instance of the class with updated attributes: - self.msg: A message describing the validation result. @@ -875,9 +882,7 @@ def validate_input_yml(self, user_role_details): configuration. If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. """ - self.log("Validating the Playbook Yaml File..", "INFO") - self.log(user_role_details) if user_role_details is None or isinstance(user_role_details, dict): self.msg = "Configuration is not available in the playbook for validation or user/role details are not type list" @@ -885,51 +890,48 @@ def validate_input_yml(self, user_role_details): self.status = "failed" return self - try: - if "role_name" in user_role_details[0] and user_role_details[0].get("role_name") is not None: - rolelist = user_role_details - rolelist = self.camel_to_snake_case(rolelist) - role_details = dict(role_name=dict(required=True, type="str"), - description=dict(required=False, type="str"), - assurance=dict(required=False, type="list", elements="dict"), - network_analytics=dict(required=False, type="list", elements="dict"), - network_design=dict(required=False, type="list", elements="dict"), - network_provision=dict(required=False, type="list", elements="dict"), - network_services=dict(required=False, type="list", elements="dict"), - platform=dict(required=False, type="list", elements="dict"), - security=dict(required=False, type="list", elements="dict"), - system=dict(required=False, type="list", elements="dict"), - utilities=dict(required=False, type="list", elements="dict") - ) - valid_param, invalid_param = validate_list_of_dicts(rolelist, role_details) - - if invalid_param: - self.msg("Invalid param found in playbook: {0}".format(", ".join(invalid_param))) - self.log(self.msg, "ERROR") - self.status = "failed" - return self + if "role_name" in user_role_details[0] and user_role_details[0].get("role_name") is not None: + role_details = { + "role_name": {"required": True, "type": "str"}, + "description": {"required": False, "type": "str"}, + "assurance": {"required": False, "type": "list", "elements": "dict"}, + "network_analytics": {"required": False, "type": "list", "elements": "dict"}, + "network_design": {"required": False, "type": "list", "elements": "dict"}, + "network_provision": {"required": False, "type": "list", "elements": "dict"}, + "network_services": {"required": False, "type": "list", "elements": "dict"}, + "platform": {"required": False, "type": "list", "elements": "dict"}, + "security": {"required": False, "type": "list", "elements": "dict"}, + "system": {"required": False, "type": "list", "elements": "dict"}, + "utilities": {"required": False, "type": "list", "elements": "dict"}, + } + valid_param, invalid_param = validate_list_of_dicts(user_role_details, role_details) - self.validated_config = valid_param - self.msg = "Successfully validated playbook config params: {0}".format(str(valid_param[0])) - self.log(self.msg, "INFO") - self.status = "success" + if invalid_param: + self.msg = "Invalid parameter(s) found in playbook: {0}".format(", ".join(invalid_param)) + self.log(self.msg, "ERROR") + self.status = "failed" return self - elif "username" in user_role_details[0] or "email" in user_role_details[0]: - userlist = user_role_details - userlist = self.camel_to_snake_case(userlist) - user_details = dict(first_name=dict(required=False, type="str"), - last_name=dict(required=False, type="str"), - email=dict(required=False, type="str"), - password=dict(required=False, type="str"), - username=dict(required=False, type="str"), - role_list=dict(required=False, type="list", elements="str"), - ) + self.validated_config = valid_param + self.msg = "Successfully validated playbook config params: {0}".format(str(valid_param[0])) + self.log(self.msg, "INFO") + self.status = "success" + return self - valid_param, invalid_param = validate_list_of_dicts(userlist, user_details) + if "username" in user_role_details[0] or "email" in user_role_details[0]: + if user_role_details[0].get("username") is not None or user_role_details[0].get("email") is not None: + user_details = { + "first_name": {"required": False, "type": "str"}, + "last_name": {"required": False, "type": "str"}, + "email": {"required": False, "type": "str"}, + "password": {"required": False, "type": "str"}, + "username": {"required": False, "type": "str"}, + "role_list": {"required": False, "type": "list", "elements": "str"}, + } + valid_param, invalid_param = validate_list_of_dicts(user_role_details, user_details) if invalid_param: - self.msg("Invalid param found in playbook: {0}".format(", ".join(invalid_param))) + self.msg = "Invalid parameter(s) found in playbook: {0}".format(", ".join(invalid_param)) self.log(self.msg, "ERROR") self.status = "failed" return self @@ -940,24 +942,31 @@ def validate_input_yml(self, user_role_details): self.status = "success" return self - else: - self.msg = "Configuration params like username or email or role_name is not available in the playbook" - self.log(self.msg, "ERROR") - self.status = "failed" - return self + self.msg = "Configuration params like username or email or role_name is not available in the playbook" + self.log(self.msg, "ERROR") + self.status = "failed" + return self - except Exception: - self.msg = "Any of the role parameters like assurance, network_analytics, network_design, etc.. are not type list" - self.log(self.msg, "ERROR") - self.status = "failed" - return self + def validate_string_parameter(self, param_name, param_value, error_messages, max_length=255): + """ + Helper function to validate string parameters. + """ + param_spec = {"type": "str", "length_max": max_length} + validate_str(param_value, param_spec, param_name, error_messages) + + def validate_string_field(self, field_value, regex, error_message, error_messages): + """ + Helper function to validate string fields against a regex pattern. + """ + if field_value and not regex.match(field_value): + error_messages.append(error_message) def valid_role_config_parameters(self, role_config): """ - Addtional validation for the create role configuration payload. + Additional validation for the create role configuration payload. Parameters: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - - ap_config (dict): A dictionary containing the input configuration details. + - role_config (dict): A dictionary containing the input configuration details. Returns: The method returns an instance of the class with updated attributes: - self.msg: A message describing the validation result. @@ -969,320 +978,145 @@ def valid_role_config_parameters(self, role_config): - To use this method, create an instance of the class and call "valid_role_config_parameters" on it. - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. """ + self.log("Validating role configuration parameters...", "INFO") + error_messages = [] - errormsg = [] - - if role_config.get("role_name"): - role_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") - if not role_name_regex.match(role_config["role_name"]): - errormsg.append("""Role name: role_name must only contain letters, numbers, underscores, - and hyphens and should not contain spaces or other special characters""") + role_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + self.validate_string_field(role_config.get("role_name"), role_name_regex, + "Role name: 'role_name' must only contain letters, numbers, underscores,\ + and hyphens and should not contain spaces or other special characters.", error_messages) if role_config.get("description"): - param_spec = dict(type="str", length_max=255) - validate_str(role_config["description"], param_spec, "description", errormsg) + self.validate_string_parameter("description", role_config["description"], error_messages) assurance_list = role_config.get("assurance", []) - - if assurance_list: - for assurance_dict in assurance_list: - if assurance_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(assurance_dict["overall"], param_spec, "overall", errormsg) - - if assurance_dict.get("monitoring_and_troubleshooting"): - param_spec = dict(type="str", length_max=255) - validate_str(assurance_dict["monitoring_and_troubleshooting"], param_spec, "monitoring_and_troubleshooting", errormsg) - - if assurance_dict.get("monitoring_settings"): - param_spec = dict(type="str", length_max=255) - validate_str(assurance_dict["monitoring_settings"], param_spec, "monitoring_settings", errormsg) - - if assurance_dict.get("troubleshooting_tools"): - param_spec = dict(type="str", length_max=255) - validate_str(assurance_dict["troubleshooting_tools"], param_spec, "troubleshooting_tools", errormsg) + if assurance_list is not None: + for assurance in assurance_list: + for param in ["overall", "monitoring_and_troubleshooting", "monitoring_settings", "troubleshooting_tools"]: + if assurance.get(param): + self.validate_string_parameter(param, assurance[param], error_messages) network_analytics_list = role_config.get("network_analytics", []) - - if network_analytics_list: - for network_analytics_dect in network_analytics_list: - if network_analytics_dect.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(network_analytics_dect["overall"], param_spec, "overall", errormsg) - - if network_analytics_dect.get("data_access"): - param_spec = dict(type="str", length_max=255) - validate_str(network_analytics_dect["data_access"], param_spec, "data_access", errormsg) + if network_analytics_list is not None: + for network_analytics in network_analytics_list: + for param in ["overall", "data_access"]: + if network_analytics.get(param): + self.validate_string_parameter(param, network_analytics[param], error_messages) network_design_list = role_config.get("network_design", []) - - if network_design_list: - for network_design_dict in network_design_list: - if network_design_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["overall"], param_spec, "overall", errormsg) - - if network_design_dict.get("advanced_network_settings"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["advanced_network_settings"], param_spec, "advanced_network_settings", errormsg) - - if network_design_dict.get("image_repository"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["image_repository"], param_spec, "image_repository", errormsg) - - if network_design_dict.get("network_hierarchy"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["network_hierarchy"], param_spec, "network_hierarchy", errormsg) - - if network_design_dict.get("network_profiles"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["network_profiles"], param_spec, "network_profiles", errormsg) - - if network_design_dict.get("network_settings"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["network_settings"], param_spec, "network_settings", errormsg) - - if network_design_dict.get("virtual_network"): - param_spec = dict(type="str", length_max=255) - validate_str(network_design_dict["virtual_network"], param_spec, "virtual_network", errormsg) + if network_design_list is not None: + for network_design in network_design_list: + for param in ["overall", "advanced_network_settings", "image_repository", "network_hierarchy", + "network_profiles", "network_settings", "virtual_network"]: + if network_design.get(param): + self.validate_string_parameter(param, network_design[param], error_messages) network_provision_list = role_config.get("network_provision", []) - - if network_provision_list: - for network_provision_dict in network_provision_list: - if network_provision_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["overall"], param_spec, "overall", errormsg) - - if network_provision_dict.get("compliance"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["compliance"], param_spec, "compliance", errormsg) - - if network_provision_dict.get("image_update"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["image_update"], param_spec, "image_update", errormsg) - - if network_provision_dict.get("inventory_management"): - inventory_management_list = network_provision_dict.get("inventory_management", []) - - for inventory_management_dict in inventory_management_list: - if inventory_management_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["overall"], param_spec, "overall", errormsg) - - if inventory_management_dict.get("device_configuration"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["device_configuration"], param_spec, "device_configuration", errormsg) - - if inventory_management_dict.get("discovery"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["discovery"], param_spec, "discovery", errormsg) - - if inventory_management_dict.get("network_device"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["network_device"], param_spec, "network_device", errormsg) - - if inventory_management_dict.get("port_management"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["port_management"], param_spec, "port_management", errormsg) - - if inventory_management_dict.get("topology"): - param_spec = dict(type="str", length_max=255) - validate_str(inventory_management_dict["topology"], param_spec, "topology", errormsg) - - if network_provision_dict.get("license"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["license"], param_spec, "license", errormsg) - - if network_provision_dict.get("network_telemetry"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["network_telemetry"], param_spec, "network_telemetry", errormsg) - - if network_provision_dict.get("pnp"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["pnp"], param_spec, "pnp", errormsg) - - if network_provision_dict.get("provision"): - param_spec = dict(type="str", length_max=255) - validate_str(network_provision_dict["provision"], param_spec, "provision", errormsg) + if network_provision_list is not None: + for network_provision in network_provision_list: + for param in ["overall", "compliance", "image_update", "license", "network_telemetry", "pnp", "provision"]: + if network_provision.get(param): + self.validate_string_parameter(param, network_provision[param], error_messages) + + inventory_management_list = network_provision.get("inventory_management", []) + if inventory_management_list is not None: + for inventory_management in inventory_management_list: + for param in ["overall", "device_configuration", "discovery", "network_device", "port_management", "topology"]: + if inventory_management.get(param): + self.validate_string_parameter(param, inventory_management[param], error_messages) network_services_list = role_config.get("network_services", []) - - if network_services_list: - for network_services_dict in network_services_list: - if network_services_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(network_services_dict["overall"], param_spec, "overall", errormsg) - - if network_services_dict.get("app_hosting"): - param_spec = dict(type="str", length_max=255) - validate_str(network_services_dict["app_hosting"], param_spec, "app_hosting", errormsg) - - if network_services_dict.get("bonjour"): - param_spec = dict(type="str", length_max=255) - validate_str(network_services_dict["bonjour"], param_spec, "bonjour", errormsg) - - if network_services_dict.get("stealthwatch"): - param_spec = dict(type="str", length_max=255) - validate_str(network_services_dict["stealthwatch"], param_spec, "stealthwatch", errormsg) - - if network_services_dict.get("umbrella"): - param_spec = dict(type="str", length_max=255) - validate_str(network_services_dict["umbrella"], param_spec, "umbrella", errormsg) + if network_services_list is not None: + for network_services in network_services_list: + for param in ["overall", "app_hosting", "bonjour", "stealthwatch", "umbrella"]: + if network_services.get(param): + self.validate_string_parameter(param, network_services[param], error_messages) platform_list = role_config.get("platform", []) - - if platform_list: - for platform_dict in platform_list: - if platform_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(platform_dict["overall"], param_spec, "overall", errormsg) - - if platform_dict.get("apis"): - param_spec = dict(type="str", length_max=255) - validate_str(platform_dict["apis"], param_spec, "apis", errormsg) - - if platform_dict.get("bundles"): - param_spec = dict(type="str", length_max=255) - validate_str(platform_dict["bundles"], param_spec, "bundles", errormsg) - - if platform_dict.get("events"): - param_spec = dict(type="str", length_max=255) - validate_str(platform_dict["events"], param_spec, "events", errormsg) - - if platform_dict.get("reports"): - param_spec = dict(type="str", length_max=255) - validate_str(platform_dict["reports"], param_spec, "reports", errormsg) + if platform_list is not None: + for platform in platform_list: + for param in ["overall", "apis", "bundles", "events", "reports"]: + if platform.get(param): + self.validate_string_parameter(param, platform[param], error_messages) security_list = role_config.get("security", []) - - if security_list: - for security_dict in security_list: - if security_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(security_dict["overall"], param_spec, "overall", errormsg) - - if security_dict.get("group_based_policy"): - param_spec = dict(type="str", length_max=255) - validate_str(security_dict["group_based_policy"], param_spec, "group_based_policy", errormsg) - - if security_dict.get("ip_based_access_control"): - param_spec = dict(type="str", length_max=255) - validate_str(security_dict["ip_based_access_control"], param_spec, "ip_based_access_control", errormsg) - - if security_dict.get("security_advisories"): - param_spec = dict(type="str", length_max=255) - validate_str(security_dict["security_advisories"], param_spec, "security_advisories", errormsg) + if security_list is not None: + for security in security_list: + for param in ["overall", "group_based_policy", "ip_based_access_control", "security_advisories"]: + if security.get(param): + self.validate_string_parameter(param, security[param], error_messages) system_list = role_config.get("system", []) - - if system_list: - for system_dict in system_list: - if system_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(system_dict["overall"], param_spec, "overall", errormsg) - - if system_dict.get("machine_reasoning"): - param_spec = dict(type="str", length_max=255) - validate_str(system_dict["machine_reasoning"], param_spec, "machine_reasoning", errormsg) - - if system_dict.get("system_management"): - param_spec = dict(type="str", length_max=255) - validate_str(system_dict["system_management"], param_spec, "system_management", errormsg) + if system_list is not None: + for system in system_list: + for param in ["overall", "machine_reasoning", "system_management"]: + if system.get(param): + self.validate_string_parameter(param, system[param], error_messages) utilities_list = role_config.get("utilities", []) - - if utilities_list: - for utilities_dict in utilities_list: - if utilities_dict.get("overall"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["overall"], param_spec, "overall", errormsg) - - if utilities_dict.get("audit_log"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["audit_log"], param_spec, "audit_log", errormsg) - - if utilities_dict.get("event_viewer"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["event_viewer"], param_spec, "event_viewer", errormsg) - - if utilities_dict.get("network_reasoner"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["network_reasoner"], param_spec, "network_reasoner", errormsg) - - if utilities_dict.get("scheduler"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["scheduler"], param_spec, "scheduler", errormsg) - - if utilities_dict.get("search"): - param_spec = dict(type="str", length_max=255) - validate_str(utilities_dict["search"], param_spec, "search", errormsg) - - if len(errormsg) > 0: - self.msg = "Invalid parameters in playbook config: {0}".format(str("\n".join(errormsg))) + if utilities_list is not None: + for utilities in utilities_list: + for param in ["overall", "audit_log", "event_viewer", "network_reasoner", "scheduler", "search"]: + if utilities.get(param): + self.validate_string_parameter(param, utilities[param], error_messages) + + if error_messages: + self.msg = "Invalid parameters in playbook config: {0}".format(", ".join(error_messages)) self.log(self.msg, "ERROR") self.status = "failed" return self - self.msg = "Successfully validated config params:{0}".format(str(role_config)) + self.msg = "Successfully validated config params: {0}".format(str(role_config)) self.log(self.msg, "INFO") self.status = "success" return self def valid_user_config_parameters(self, user_config): """ - Addtional validation for the create user configuration payload. + Additional validation for the create user configuration payload. Parameters: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - - ap_config (dict): A dictionary containing the input configuration details. + - user_config (dict): A dictionary containing the input configuration details. Returns: The method returns an instance of the class with updated attributes: - self.msg: A message describing the validation result. - self.status: The status of the validation (either "success" or "failed"). Description: - To use this method, create an instance of the class and call "valid_user_config_parameters" on it. - - If the validation succeeds it return "success". + - If the validation succeeds it returns "success". - If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. - - To use this method, create an instance of the class and call "valid_user_config_parameters" on it. - - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. """ + self.log("Validating user configuration parameters...", "INFO") + error_messages = [] - errormsg = [] - - if user_config.get("first_name"): - first_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") - if not first_name_regex.match(user_config["first_name"]): - errormsg.append("""first_name: first_name must only contain letters, numbers, underscores, and hyphens and - should not contain spaces or other special characters""") + first_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + self.validate_string_field(user_config.get("first_name"), first_name_regex, "first_name: 'first_name' must only contain letters, numbers, \ + underscores, and hyphens and should not contain spaces or other special characters.", error_messages) - if user_config.get("last_name"): - last_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") - if not last_name_regex.match(user_config["last_name"]): - errormsg.append("""last_name: last_name must only contain letters, numbers, underscores, and hyphens and - should not contain spaces or other special characters""") + last_name_regex = re.compile(r"^[A-Za-z0-9_-]+$") + self.validate_string_field(user_config.get("last_name"), last_name_regex, "last_name: 'last_name' must only contain letters, numbers, \ + underscores, and hyphens and should not contain spaces or other special characters.", error_messages) + email_regex = re.compile(r"[^@]+@[^@]+\.[^@]+") if user_config.get("email"): - email_regex = re.compile(r"[^@]+@[^@]+\.[^@]+") - if not email_regex.match(user_config["email"]): - errormsg.append("email: Invalid email format for email: {0}".format(user_config["email"])) + self.validate_string_field(user_config.get("email"), email_regex, + "email: Invalid email format for 'email': {0}".format(user_config.get("email")), error_messages) + password_regex = re.compile(r"^(?=.*[A-Z])(?=.*[a-z])(?=.*\d)(?=.*[@$!%*?&])[A-Za-z\d@$!%*?&]{8,}$") if user_config.get("password"): - password_regex = re.compile(r"^(?=.*[A-Z])(?=.*[a-z])(?=.*\d)(?=.*[@$!%*?&])[A-Za-z\d@$!%*?&]{8,}$") - if not password_regex.match(user_config["password"]): - errormsg.append("password: Password does not meet complexity requirements for password: {0}".format(user_config["password"])) + self.validate_string_field(user_config.get("password"), password_regex, "password: 'Password' does not meet complexity requirements\ + for password: {0}".format(user_config.get("email")), error_messages) - if user_config.get("username"): - username_regex = re.compile(r"^[A-Za-z0-9_-]+$") - if not username_regex.match(user_config["username"]): - errormsg.append("""username: Username must only contain letters, numbers, underscores, and hyphens and - should not contain spaces or other special characters""") + username_regex = re.compile(r"^[A-Za-z0-9_-]+$") + self.validate_string_field(user_config.get("username"), username_regex, "username: 'Username' must only contain letters, numbers, \ + underscores, and hyphens and should not contain spaces or other special characters.", error_messages) if user_config.get("role_list"): param_spec = dict(type="list", elements="str") - validate_list(user_config["role_list"], param_spec, "role_list", errormsg) + validate_list(user_config["role_list"], param_spec, "role_list", error_messages) - if len(errormsg) > 0: - self.msg = "Invalid parameters in playbook config: {0}".format(str("\n".join(errormsg))) + if error_messages: + self.msg = "Invalid parameters in playbook config: {0}".format(str(", ".join(error_messages))) self.log(self.msg, "ERROR") self.status = "failed" return self @@ -1306,7 +1140,6 @@ def get_want(self, config): - Stores the gathered information in the "want" attribute for later reference. - Logs the desired state configuration for debugging and informational purposes. """ - want = {} for key, value in config.items(): want[key] = value @@ -1315,6 +1148,25 @@ def get_want(self, config): self.log("Desired State (want): {0}".format(str(self.want)), "INFO") return self + def update_have_with_role(self, have, role_exists, current_role_config): + """ + Helper function to update the 'have' dictionary with role details. + """ + if role_exists: + have["role_name"] = current_role_config.get("name") + have["current_role_config"] = current_role_config + have["role_exists"] = role_exists + + def update_have_with_user(self, have, user_exists, current_user_config, current_role_id_config): + """ + Helper function to update the 'have' dictionary with user details. + """ + if user_exists: + have["username"] = current_user_config.get("username") + have["current_user_config"] = current_user_config + have["user_exists"] = user_exists + have["current_role_id_config"] = current_role_id_config + def get_have(self, input_config): """ Retrieve and store current user or role details from Cisco Catalyst Center based on input configuration. @@ -1329,50 +1181,18 @@ def get_have(self, input_config): - If the input specifies a username or email, checks and retrieves current user configuration. - Stores retrieved user or role details in the "have" attribute for later reference. """ - - user_exists = False - role_exists = False - current_user_config = None - current_role_config = None - current_role_id_config = None + self.log("Starting retrieval of user or role details...", "INFO") have = {} if "role_name" in input_config and input_config["role_name"] is not None: - (role_exists, current_role_config) = self.get_current_config(input_config) - - if not role_exists: - self.log("The provided role {0} is not present in the Cisco Catalyst Center. Role_exists = \ - {1}".format(str(input_config.get("role_name")), str(role_exists)), "INFO") - + role_exists, current_role_config = self.get_current_config(input_config) self.log("Current role config details (have): {0}".format(str(current_role_config)), "DEBUG") + self.update_have_with_role(have, role_exists, current_role_config) - if role_exists: - have["role_name"] = current_role_config.get("name") - have["role_exists"] = role_exists - have["current_role_config"] = current_role_config - else: - have["role_exists"] = role_exists - - elif input_config["username"] is not None or input_config["email"] is not None: - (user_exists, role_exists, current_user_config, current_role_id_config) = self.get_current_config(input_config) - - if not user_exists: - self.log("The provided user {0} is not present in the Cisco Catalyst Center. User_exists = \ - {1}".format(str(input_config.get("username")), str(user_exists)), "INFO") - + if "username" in input_config or "email" in input_config: + user_exists, current_user_config, current_role_id_config = self.get_current_config(input_config) self.log("Current user config details (have): {0}".format(str(current_user_config)), "DEBUG") - - if user_exists: - have["username"] = current_user_config.get("username") - have["user_exists"] = user_exists - have["current_user_config"] = current_user_config - have["current_role_id_config"] = current_role_id_config - else: - have["user_exists"] = user_exists - have["current_role_id_config"] = current_role_id_config - - if role_exists: - have["current_role_id_config"] = current_role_id_config + self.update_have_with_user(have, user_exists, current_user_config, current_role_id_config) self.have = have self.log("Current State (have): {0}".format(str(self.have)), "INFO") @@ -1394,24 +1214,21 @@ def get_diff_merged(self, config): - Returns the instance of the class used for interacting with Cisco Catalyst Center after updating or creating the user or role. """ - - config_updated = False - config_created = False + self.log("Starting the users and roles create/update process...", "INFO") task_response = None responses = {} - # check if the given user or role config exists and decided on updated/created operation need to be done. - - if "role_name" in config and config["role_name"] is not None: + if "role_name" in config: + # update the role if role exists if self.have.get("role_exists"): - # update the role self.valid_role_config_parameters(config).check_return_status() desired_role = self.generate_role_payload(self.want, "update") self.log("desired role with config {0}".format(str(desired_role)), "INFO") + if "error" not in desired_role: consolidated_data, update_required_param = self.role_requires_update(self.have["current_role_config"], desired_role) + if not consolidated_data: - # role does not need update self.msg = "Role does not need any update" self.log(self.msg, "INFO") responses["role_operation"] = {"response": config} @@ -1422,16 +1239,17 @@ def get_diff_merged(self, config): task_response = self.update_role(update_required_param) else: task_response = desired_role - else: # Create the role self.valid_role_config_parameters(config).check_return_status() self.log("Creating role with config {0}".format(str(config)), "INFO") role_info_params = self.generate_role_payload(self.want, "create") + if "error" not in role_info_params: filtered_data, overall_update_required = self.get_permissions(self.want, role_info_params, "create") denied_permissions = self.find_denied_permissions(self.want) denied_required, create_role_params = self.remove_denied_operations(filtered_data, denied_permissions) + if denied_required or overall_update_required: task_response = self.create_role(create_role_params) else: @@ -1439,14 +1257,14 @@ def get_diff_merged(self, config): else: task_response = role_info_params - elif config["username"] is not None or config["email"] is not None: + if "username" in config or "email" in config: + # update the user if role exists if self.have.get("user_exists"): - # update the user self.valid_user_config_parameters(config).check_return_status() (consolidated_data, update_required_param) = self.user_requires_update(self.have["current_user_config"], self.have["current_role_id_config"]) self.log(update_required_param) + if not consolidated_data: - # user does not need update self.msg = "User does not need any update" self.log(self.msg, "INFO") responses["role_operation"] = {"response": config} @@ -1462,7 +1280,8 @@ def get_diff_merged(self, config): user_info_params = self.snake_to_camel_case(update_param) task_response = self.update_user(user_info_params) else: - task_response = {"error": "Role name is not present in the Cisco Catalyst Center: Please provide a valid role name"} + task_response = {"error": "The role name in the user details role_list is not present in the Cisco Catalyst Center," + " Please provide a valid role name"} else: # Create the user self.valid_user_config_parameters(config).check_return_status() @@ -1491,32 +1310,20 @@ def get_diff_merged(self, config): user_info_params = self.snake_to_camel_case(user_details) task_response = self.create_user(user_info_params) else: - task_response = {"error": "Role name is not present in the Cisco Catalyst Center: Please provide a valid role name"} - - if "error" in task_response: - config_created = False - else: - config_created = True - - if config_updated: - self.log("Task response {0}".format(str(task_response)), "INFO") - responses["users_operation"] = {"response": task_response} - self.msg = responses - self.result["response"] = self.msg - self.status = "success" - self.log(self.msg, "INFO") - return self + task_response = {"error": "The role name in the user details role_list is not present in the Cisco Catalyst Center," + " Please provide a valid role name"} - if config_created: + if task_response and "error" not in task_response: self.log("Task respoonse {0}".format(str(task_response)), "INFO") - responses["users_operation"] = {"response": task_response} + responses["operation"] = {"response": task_response} self.msg = responses self.result["response"] = self.msg + self.result['changed'] = True self.status = "success" self.log(self.msg, "INFO") return self - self.msg = "Task response: {0}".format(str(task_response.get("error"))) + self.msg = task_response.get("error") self.log(self.msg, "ERROR") self.status = "failed" return self @@ -1530,12 +1337,11 @@ def get_current_config(self, input_config): - input_config (dict): A dictionary containing input parameters for retrieving user or role details. Returns: - - user containing: + - If username is in input_config: - user_exists (bool): True if the user exists, False otherwise. - current_user_configuration (dict): Dictionary containing current user details. - current_role_id (dict): Dictionary containing current role IDs. - - role_exists (bool): True if the role exists, False otherwise. - - role containing: + - If role_name is in input_config: - role_exists (bool): True if the role exists, False otherwise. - current_role_configuration (dict): Dictionary containing current role details. @@ -1546,50 +1352,48 @@ def get_current_config(self, input_config): by querying the "get_roles_ap_i" function in the "user_and_roles" family. - Logs errors if required parameters are missing in the playbook config. """ - user_exists = False role_exists = False current_user_configuration = {} current_role_configuration = {} current_role_id = {} - response_user = None - response_role = None - - response_user = self.get_user() - response_role = self.get_role() - - if response_user and response_role: - response_user = self.camel_to_snake_case(response_user) + if "role_name" in input_config and input_config["role_name"] is not None: + response_role = self.get_role() response_role = self.camel_to_snake_case(response_role) + roles = response_role.get("response", {}).get("roles", []) - users = response_user.get("response", {0}).get("users", []) - roles = response_role.get("response", {0}).get("roles", []) + for role in roles: + if role.get("name") == input_config.get("role_name"): + current_role_configuration = role + role_exists = True - if "role_name" in input_config and input_config["role_name"] is not None: - for role in roles: - if role.get("name") == input_config.get("role_name"): - current_role_configuration = role - role_exists = True + return role_exists, current_role_configuration - return role_exists, current_role_configuration - - elif input_config["username"] is not None or input_config["email"] is not None: - for user in users: - if user.get("username") == input_config.get("username"): + if "username" in input_config or "email" in input_config: + response_user = self.get_user() + response_role = self.get_role() + response_user = self.camel_to_snake_case(response_user) + response_role = self.camel_to_snake_case(response_role) + users = response_user.get("response", {}).get("users", []) + roles = response_role.get("response", {}).get("roles", []) + + for user in users: + if user.get("username") == input_config.get("username"): + current_user_configuration = user + user_exists = True + elif input_config.get("email") is not None: + if user.get("email") == input_config.get("email"): current_user_configuration = user user_exists = True - elif input_config.get("email") is not None: - if user.get("email") == input_config.get("email"): - current_user_configuration = user - user_exists = True - if input_config.get("role_list") is not None and input_config.get("role_list"): + if input_config.get("role_list"): + for role_name in input_config["role_list"]: for role in roles: - if role.get("name").lower() == input_config.get("role_list")[0].lower(): + if role.get("name").lower() == role_name.lower(): current_role_id[role.get("name").lower()] = role.get("role_id") - role_exists = True - return user_exists, role_exists, current_user_configuration, current_role_id + + return user_exists, current_user_configuration, current_role_id def create_user(self, user_params): """ @@ -1605,7 +1409,6 @@ def create_user(self, user_params): - Logs the provided user parameters and the received API response. - Returns the API response from the "create_user" function. """ - try: self.log("Create user with user_info_params: {0}".format(str(user_params)), "DEBUG") response = self.dnac._exec( @@ -1617,8 +1420,8 @@ def create_user(self, user_params): self.log("Received API response from create_user: {0}".format(str(response)), "DEBUG") return response - except Exception as e: - error_message = "Mandatory field not present: An error occurred while creating the user: {0}".format(str(e)) + except Exception: + error_message = "Mandatory field not present: An error occurred while creating the user" return {"error": error_message} def create_role(self, role_params): @@ -1635,7 +1438,6 @@ def create_role(self, role_params): - Logs the provided role parameters and the received API response. - Returns the API response from the "create_role" function. """ - try: self.log("Create role with role_info_params: {0}".format(str(role_params)), "DEBUG") response = self.dnac._exec( @@ -1647,8 +1449,8 @@ def create_role(self, role_params): self.log("Received API response from create_role: {0}".format(str(response)), "DEBUG") return response - except Exception as e: - error_message = "An error occurred while creating the role without access-level parameters and permissions: {0}".format(str(e)) + except Exception: + error_message = "An error occurred while creating the role without access-level parameters and permissions" return {"error": error_message} def get_user(self): @@ -1663,7 +1465,6 @@ def get_user(self): and "get_users_ap_i" function. - Logs the received API response and returns it. """ - response = self.dnac._exec( family="user_and_roles", function="get_users_ap_i", @@ -1685,7 +1486,6 @@ def get_role(self): and "get_roles_ap_i" function. - Logs the received API response and returns it. """ - response = self.dnac._exec( family="user_and_roles", function="get_roles_ap_i", @@ -1694,33 +1494,14 @@ def get_role(self): self.log("Received API response from get_roles_api: {0}".format(str(response)), "DEBUG") return response - def generate_role_payload(self, role_config, role_operation): + def process_assurance_rules(self, role_config, role_operation, unique_types): """ - Generate a role payload for Cisco Catalyst Center. + Process the assurance rules and update the unique_types dictionary with the corresponding operations. Parameters: - - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - - role_config (dict): A dictionary containing the configuration for the role. - Returns: - - payload (dict): A dictionary containing the payload for the role with processed resource types and operations. - Description: - - Generates a payload for a role based on the given role configuration. - - Processes various sections of the role configuration, such as assurance, network analytics, - network design, network provision, network services, platform, security, system, and utilities. - - Validates permissions and converts them to corresponding operations using the convert_permission_to_operations method. - - If the permission is valid and not set to "deny", constructs a resource type entry with operations and appends it to resource_types. - - The final payload includes the role name, description, and the list of resource types with operations. + - role_config (dict): The role configuration containing assurance rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - - if not role_config: - return None - - role_name = role_config.get("role_name", "") - description = role_config.get("description", "") - - resource_types = [] - unique_types = {} - - # Process assurance rules if "assurance" in role_config and role_config.get("assurance") is not None: if role_operation != "update": default_entries = [ @@ -1741,10 +1522,10 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for assurance resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -1773,9 +1554,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -1789,10 +1568,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process network analytics rules + def process_network_analytics_rules(self, role_config, role_operation, unique_types): + """ + Process the network analytics rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing network analytics rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "network_analytics" in role_config and role_config.get("network_analytics") is not None: if role_operation != "update": new_entry = { @@ -1808,10 +1593,10 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for network analytics resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -1827,9 +1612,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": new_entry = { @@ -1837,10 +1620,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process network design rules + def process_network_design_rules(self, role_config, role_operation, unique_types): + """ + Process the network design rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing network design rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "network_design" in role_config and role_config.get("network_design") is not None: if role_operation != "update": default_entries = [ @@ -1865,10 +1654,10 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for network design resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -1893,9 +1682,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -1912,10 +1699,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process network provision rules + def process_network_provision_rules(self, role_config, role_operation, unique_types): + """ + Process the network provision rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing network provision rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "network_provision" in role_config and role_config.get("network_provision") is not None: if role_operation != "update": default_entries = [ @@ -1952,9 +1745,10 @@ def generate_role_payload(self, role_config, role_operation): else: sub_permission = sub_permission.lower() - if sub_permission not in ["read", "write", "deny", None]: - return {"error": "Invalid permission {0} for sub-resource {1}".format(str(sub_permission), str(sub_resource))} - if sub_permission != "deny" and sub_permission is not None: + if sub_permission not in ["read", "write", "deny"]: + return {"error": "Invalid permission {0} for network provision for \ + sub-resource {1}".format(str(sub_permission), str(sub_resource))} + if sub_permission != "deny": operations = self.convert_permission_to_operations(sub_permission) if sub_resource == "overall": @@ -1979,17 +1773,15 @@ def generate_role_payload(self, role_config, role_operation): } unique_types[new_entry["type"]] = new_entry - resource_types = list(unique_types.values()) - else: if permission is None: continue else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: - return {"error": "Invalid permission {0} for resource {1}".format(str(permission), str(resource))} - if permission != "deny" and permission is not None: + if permission not in ["read", "write", "deny"]: + return {"error": "Invalid permission {0} for network provision resource {1}".format(str(permission), str(resource))} + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -2034,9 +1826,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -2059,10 +1849,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process network services rules + def process_network_services_rules(self, role_config, role_operation, unique_types): + """ + Process the network services rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing network services rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "network_services" in role_config and role_config.get("network_services") is not None: if role_operation != "update": default_entries = [ @@ -2085,9 +1881,9 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for network services resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -2110,9 +1906,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -2127,10 +1921,15 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process platform rules + def process_platform_rules(self, role_config, unique_types): + """ + Process the platform rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing platform rules. + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "platform" in role_config and role_config.get("platform") is not None: for platform in role_config["platform"]: for resource, permission in platform.items(): @@ -2139,9 +1938,9 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for platform resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": new_entries = [ @@ -2170,10 +1969,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process security rules + def process_security_rules(self, role_config, role_operation, unique_types): + """ + Process the security rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing security rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "security" in role_config and role_config.get("security") is not None: if role_operation != "update": default_entries = [ @@ -2195,9 +2000,9 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for security resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -2233,9 +2038,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -2249,10 +2052,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process system rules + def process_system_rules(self, role_config, role_operation, unique_types): + """ + Process the system rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing system rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "system" in role_config and role_config.get("system") is not None: if role_operation != "update": default_entries = [ @@ -2273,9 +2082,9 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for system resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -2296,9 +2105,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -2311,10 +2118,16 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} - resource_types = list(unique_types.values()) - - # Process utilities rules + def process_utilities_rules(self, role_config, role_operation, unique_types): + """ + Process the utilities rules and update the unique_types dictionary with the corresponding operations. + Parameters: + - role_config (dict): The role configuration containing utilities rules. + - role_operation (str): The operation type (e.g., "update"). + - unique_types (dict): A dictionary to store the unique resource types and their operations. + """ if "utilities" in role_config and role_config.get("utilities") is not None: if role_operation != "update": default_entries = [ @@ -2342,9 +2155,9 @@ def generate_role_payload(self, role_config, role_operation): else: permission = permission.lower() - if permission not in ["read", "write", "deny", None]: + if permission not in ["read", "write", "deny"]: return {"error": "Invalid permission {0} for utilities resource {1}".format(permission, resource)} - if permission != "deny" and permission is not None: + if permission != "deny": operations = self.convert_permission_to_operations(permission) if resource == "overall": @@ -2369,9 +2182,7 @@ def generate_role_payload(self, role_config, role_operation): "operations": operations } unique_types[new_entry["type"]] = new_entry - - resource_types = list(unique_types.values()) - + return {} else: if role_operation != "update": default_entries = [ @@ -2391,8 +2202,75 @@ def generate_role_payload(self, role_config, role_operation): "operations": ["gRead"] } unique_types[new_entry["type"]] = new_entry + return {} + + def generate_role_payload(self, role_config, role_operation): + """ + Generate a role payload for Cisco Catalyst Center. + Parameters: + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_config (dict): A dictionary containing the configuration for the role. + Returns: + - payload (dict): A dictionary containing the payload for the role with processed resource types and operations. + Description: + - Generates a payload for a role based on the given role configuration. + - Processes various sections of the role configuration, such as assurance, network analytics, + network design, network provision, network services, platform, security, system, and utilities. + - Validates permissions and converts them to corresponding operations using the convert_permission_to_operations method. + - If the permission is valid and not set to "deny", constructs a resource type entry with operations and appends it to resource_types. + - The final payload includes the role name, description, and the list of resource types with operations. + """ + self.log("Generate payload for role creation/updation...") + role_name = role_config.get("role_name", "") + description = role_config.get("description", "") + resource_types = [] + unique_types = {} + function_responce = self.process_assurance_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_network_analytics_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_network_design_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_network_provision_rules(role_config, role_operation, unique_types) - resource_types = list(unique_types.values()) + if function_responce: + return function_responce + + function_responce = self.process_network_services_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_platform_rules(role_config, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_security_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_system_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + function_responce = self.process_utilities_rules(role_config, role_operation, unique_types) + + if function_responce: + return function_responce + + resource_types = list(unique_types.values()) # Construct the final payload payload = { @@ -2418,13 +2296,10 @@ def convert_permission_to_operations(self, permission): - For "write" or "Write" permissions, it returns a list containing "gRead", "gUpdate", "gCreate", and "gRemove". - If the permission level is not recognized, it returns None. """ - if permission == "read": return ["gRead"] elif permission == "write": return ["gRead", "gUpdate", "gCreate", "gRemove"] - else: - return None def role_requires_update(self, current_role, desired_role): """ @@ -2443,7 +2318,6 @@ def role_requires_update(self, current_role, desired_role): - Removes denied operations based on denied permissions found in self.want. - Returns values indicating whether updates are required and the updated role information. """ - update_required = False for want_resource in desired_role["resourceTypes"]: @@ -2504,7 +2378,6 @@ def user_requires_update(self, current_user, current_role): - If any of these fields differ between current_user and self.want, update_user_param is populated with the desired values. - Returns values indicating whether updates are required and the parameters to update if so. """ - update_required = False update_user_param = {} @@ -2564,21 +2437,15 @@ def update_user(self, user_params): - This method sends a request to update a user in Cisco Catalyst Center using the provided - user parameters. It logs the response and returns it. """ - - try: - self.log("Update user with user_info_params: {0}".format(str(user_params)), "DEBUG") - response = self.dnac._exec( - family="user_and_roles", - function="update_user_ap_i", - op_modifies=True, - params=user_params, - ) - self.log("Received API response from update_user: {0}".format(str(response)), "DEBUG") - return response - - except Exception as e: - error_message = "Mandatory field not present: An error occurred while updating the user: {0}".format(str(e)) - return {"error": error_message} + self.log("Updating user with parameters: {0}".format(user_params), "DEBUG") + response = self.dnac._exec( + family="user_and_roles", + function="update_user_ap_i", + op_modifies=True, + params=user_params, + ) + self.log("Received API response from update_user: {0}".format(str(response)), "DEBUG") + return response def update_role(self, role_params): """ @@ -2595,7 +2462,6 @@ def update_role(self, role_params): and the "update_role_ap_i" function. The method logs the received API response at the "DEBUG" level and finally returns the response. """ - self.log("Update role with role_info_params: {0}".format(str(role_params)), "DEBUG") response = self.dnac._exec( family="user_and_roles", @@ -2621,30 +2487,34 @@ def find_denied_permissions(self, config, parent_key=""): The key paths are formed by combining parent keys with the current keys or indices, providing a clear path to the denied permissions within the nested structure. """ - denied_permissions = [] if isinstance(config, dict): + self.log("Processing dictionary with parent_key: {0}".format(parent_key), "DEBUG") + for key, value in config.items(): if parent_key: full_key = "{0}.{1}".format(parent_key, key) else: full_key = key + self.log("Checking key: {0}".format(full_key), "DEBUG") if isinstance(value, dict) or isinstance(value, list): denied_permissions.extend(self.find_denied_permissions(value, full_key)) elif isinstance(value, str) and value.lower() == "deny": denied_permissions.append(full_key) + self.log("Found 'deny' at key: {0}".format(full_key), "DEBUG") elif isinstance(config, list): for index, item in enumerate(config): full_key = "{0}[{1}]".format(parent_key, index) + self.log("Processing list with parent_key: {0}".format(parent_key), "DEBUG") if isinstance(item, dict): denied_permissions.extend(self.find_denied_permissions(item, full_key)) - elif isinstance(item, str) and item.lower() == "deny": - denied_permissions.append(full_key) + self.log("Found 'deny' at index: {0}".format(full_key), "DEBUG") + self.log("Denied permissions are {0}".format(str(denied_permissions)), "DEBUG") return denied_permissions def remove_denied_operations(self, input_data, denied_permissions): @@ -2663,7 +2533,7 @@ def remove_denied_operations(self, input_data, denied_permissions): - If a resource type matches any of the denied permissions, it is excluded from the updated input_data. - The method returns values indicating whether any updates were made (update_required) and the updated input_data. """ - + self.log("Starting removal of denied operations.", "DEBUG") resource_types = input_data["resourceTypes"] remaining_resource_types = [] update_required = False @@ -2678,6 +2548,7 @@ def remove_denied_operations(self, input_data, denied_permissions): denied_type_lower = "network design.network settings" if denied_type_lower in resource_type_lower: keep_resource = False + self.log("Removing resource due to denied type: {0}".format(denied_type_lower), "DEBUG") update_required = True break @@ -2685,6 +2556,7 @@ def remove_denied_operations(self, input_data, denied_permissions): denied_type_lower = "network provision.provision" if denied_type_lower in resource_type_lower: keep_resource = False + self.log("Removing resource due to denied type: {0}".format(denied_type_lower), "DEBUG") update_required = True break @@ -2692,12 +2564,14 @@ def remove_denied_operations(self, input_data, denied_permissions): denied_type_lower = "security.group-based policy" if denied_type_lower in resource_type_lower: keep_resource = False + self.log("Removing resource due to denied type: {0}".format(denied_type_lower), "DEBUG") update_required = True break else: if denied_type_lower in resource_type_lower: keep_resource = False + self.log("Removing resource due to denied type: {0}".format(denied_type_lower), "DEBUG") update_required = True break @@ -2705,6 +2579,8 @@ def remove_denied_operations(self, input_data, denied_permissions): remaining_resource_types.append(resource) input_data["resourceTypes"] = remaining_resource_types + self.log("Removal complete. Update required: {0}".format(update_required), "DEBUG") + return update_required, input_data def parse_config(self, config_section): @@ -2722,7 +2598,6 @@ def parse_config(self, config_section): - Otherwise, it directly assigns the value to the corresponding key in the parsed configuration. - The resulting dictionary represents the structured configuration details. """ - parsed_config = {} for key, value in config_section.items(): if value is None: @@ -2750,18 +2625,22 @@ def check_permission(self, permissions, resource_type): - If the keys do not match any entry in the permissions dictionary, it returns (False, True). - If the keys match and there is no "overall" permission of "deny", it returns (False, True). """ - keys = resource_type.lower().replace(" ", "_").split(".") current_level = permissions for key in keys: if key in current_level: current_level = current_level[key] + self.log("Navigated to level: {0}".format(key), "DEBUG") elif "overall" in current_level and current_level["overall"].lower() == "deny": + self.log("Permission denied at level: {0}".format(key), "DEBUG") return True, False else: + self.log("Permission allowed at level: {0}".format(key), "DEBUG") return False, True - return False, "overall" not in current_level or current_level["overall"].lower() != "deny" + overall_permission = "overall" in current_level and current_level["overall"].lower() == "deny" + self.log("Final permission check: Denied: {0}, Allowed: {1}".format(overall_permission, not overall_permission), "DEBUG") + return False, not overall_permission def get_operations(self, permissions, resource_type): """ @@ -2778,19 +2657,23 @@ def get_operations(self, permissions, resource_type): - If an "overall" permission of "deny" is found, it collects and returns specific permissions that are not denied. - If no specific operations are found or if the "overall" permission is not "deny", it returns an empty list. """ - + self.log("Retrieving operations for resource type: {0}".format(resource_type), "DEBUG") keys = resource_type.lower().replace(" ", "_").split(".") current_level = permissions for key in keys: if key in current_level: current_level = current_level[key] + self.log("Navigated to level: {0}".format(key), "DEBUG") if "overall" in current_level and current_level["overall"].lower() == "deny": specific_permissions = {} + self.log("Overall permission denied for resource type: {0}".format(resource_type), "DEBUG") + for k, v in current_level.items(): if k != "overall" and v.lower() != "deny": specific_permissions[k] = v + self.log("No specific operations found or overall permission not denied.", "DEBUG") return list(specific_permissions.values()) @@ -2814,7 +2697,7 @@ def get_permissions(self, config, input_data, role_operation): - It logs the final permissions configuration and returns the result along with a boolean indicating if any operations are denied. """ - + self.log("Starting permission retrieval for role operation: {0}".format(role_operation), "DEBUG") permissions = self.parse_config(config) allowed_operations = [] check_deny = [] @@ -2822,7 +2705,6 @@ def get_permissions(self, config, input_data, role_operation): for resource in input_data["resourceTypes"]: res_type = resource["type"] operations = resource["operations"] - check_deny_update, check_permission = self.check_permission(permissions, res_type) check_deny.append(str(check_deny_update)) @@ -2846,10 +2728,14 @@ def get_permissions(self, config, input_data, role_operation): "resourceTypes": allowed_operations } + self.log("Final permissions configuration: {0}".format(result), "DEBUG") + if "True" in check_deny: + self.log("Permission check complete. Any denied operations: True", "DEBUG") return result, True - else: - return result, False + + self.log("Permission check complete. Any denied operations: False", "DEBUG") + return result, False def get_diff_deleted(self, config): """ @@ -2865,74 +2751,60 @@ def get_diff_deleted(self, config): the specified role or user. It logs the response from the deletion operation and updates the status and result accordingly. """ - - config_delete = False - - if "role_name" in config and config["role_name"] is not None: - + if "role_name" in config: if self.have.get("role_exists"): self.valid_role_config_parameters(config).check_return_status() self.log("Deleting role with config {0}".format(str(config)), "INFO") - # Check if the role exists in self.have current_role = self.have.get("current_role_config") role_id_to_delete = {} role_id_to_delete["role_id"] = current_role.get("role_id") task_response = self.delete_role(role_id_to_delete) self.log("Task response {0}".format(str(task_response)), "INFO") - if "error" in task_response: - config_delete = False - else: - config_delete = True - if config_delete: - responses = {} - responses["role_operation"] = {"response": task_response} + if task_response and "error" not in task_response: + responses = {"role_operation": {"response": task_response}} self.msg = responses self.result["response"] = self.msg + self.result["changed"] = True self.status = "success" self.log(self.msg, "INFO") return self - else: - self.msg = task_response - self.log(self.msg, "ERROR") - self.status = "failed" - return self - else: - self.msg = "Please provide a valid role_name for role deletion" + + self.msg = task_response self.log(self.msg, "ERROR") self.status = "failed" return self - elif config["username"] is not None or config["email"] is not None: + self.msg = "Please provide a valid role_name for role deletion" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + if "username" in config or "email" in config: if self.have.get("user_exists"): self.valid_user_config_parameters(config).check_return_status() self.log("Deleting user with config {0}".format(str(config)), "INFO") - # Check if the username exists in self.have current_user = self.have.get("current_user_config") user_id_to_delete = {} user_id_to_delete["user_id"] = current_user.get("user_id") task_response = self.delete_user(user_id_to_delete) self.log("Task response {0}".format(str(task_response)), "INFO") - config_delete = True - if config_delete: - responses = {} - responses["users_operation"] = {"response": task_response} - self.msg = responses - self.result["response"] = self.msg - self.status = "success" - self.log(self.msg, "INFO") - return self - - else: - self.msg = "Please provide a valid username or email for user deletion" - self.log(self.msg, "ERROR") - self.status = "failed" + responses = {"users_operation": {"response": task_response}} + self.msg = responses + self.result["response"] = self.msg + self.result["changed"] = True + self.status = "success" + self.log(self.msg, "INFO") return self + self.msg = "Please provide a valid username or email for user deletion" + self.log(self.msg, "ERROR") + self.status = "failed" + return self + def delete_user(self, user_params): """ Delete a user in Cisco Catalyst Center with the provided parameters. @@ -2946,7 +2818,6 @@ def delete_user(self, user_params): - It logs the response and returns it. - The function uses the "user_and_roles" family and the "delete_user_ap_i" function from the Cisco Catalyst Center API. """ - self.log("delete user with user_params: {0}".format(str(user_params)), "DEBUG") response = self.dnac._exec( family="user_and_roles", @@ -2970,7 +2841,6 @@ def delete_role(self, role_params): - It logs the response and returns it. - The function uses the "user_and_roles" family and the "delete_role_ap_i" function from the Cisco Catalyst Center API. """ - try: self.log("delete role with role_params: {0}".format(str(role_params)), "DEBUG") response = self.dnac._exec( @@ -2981,7 +2851,7 @@ def delete_role(self, role_params): ) self.log("Received API response from delete_role: {0}".format(str(response)), "DEBUG") except Exception: - error_message = "An error occurred while deleting the role. Check whether user are assigned to this role: \ + error_message = "An error occurred while deleting the role. Check whether user(s) are assigned to this role \ {0}".format(str(self.have.get("role_name"))) return {"error": error_message} @@ -3006,8 +2876,7 @@ def verify_diff_merged(self, config): has been successfully verified. In case of any mismatch between the playbook input and the Catalyst Center configuration, it logs an appropriate message indicating that the merge task may not have executed successfully. """ - - if "role_name" in config and config["role_name"] is not None: + if "role_name" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") @@ -3020,6 +2889,9 @@ def verify_diff_merged(self, config): self.status = "success" self.msg = "The requested role {0} is present in the Cisco Catalyst Center and its creation has been verified.".format(role_name) self.log(self.msg, "INFO") + else: + self.log("The playbook input for role {0} does not align with the Cisco Catalyst Center, indicating that the \ + merge task may not have executed successfully.".format(role_name), "INFO") desired_role = self.generate_role_payload(self.want, "update") (require_update, updated_role_info) = self.role_requires_update(self.have["current_role_config"], desired_role) @@ -3027,11 +2899,7 @@ def verify_diff_merged(self, config): self.log("The update for role {0} has been successfully verified. The updated info - {1}".format(role_name, updated_role_info), "INFO") self. status = "success" - if not role_exist: - self.log("""The playbook input for role {0} does not align with the Cisco Catalyst Center, indicating that the \ - merge task may not have executed successfully.""".format(role_name), "INFO") - - elif config["username"] is not None or config["email"] is not None: + if "username" in config or "email" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") @@ -3044,16 +2912,15 @@ def verify_diff_merged(self, config): self.status = "success" self.msg = "The requested user {0} is present in the Cisco Catalyst Center and its creation has been verified.".format(user_name) self.log(self.msg, "INFO") + else: + self.log("The playbook input for user {0} does not align with the Cisco Catalyst Center, indicating that \ + the merge task may not have executed successfully.".format(user_name), "INFO") (require_update, updated_user_info) = self.user_requires_update(self.have["current_user_config"], self.have["current_role_id_config"]) if not require_update: self.log("The update for user {0} has been successfully verified. The updated info - {1}".format(user_name, updated_user_info), "INFO") self. status = "success" - if not user_exist: - self.log("""The playbook input for user {0} does not align with the Cisco Catalyst Center, indicating that \ - the merge task may not have executed successfully.""".format(user_name), "INFO") - return self def verify_diff_deleted(self, config): @@ -3070,8 +2937,7 @@ def verify_diff_deleted(self, config): - If the specified role or user does not exist, it sets the status to "success" and logs a confirmation message. - If the role or user still exists, it logs a mismatch message indicating the deletion was not executed successfully. """ - - if "role_name" in config and config["role_name"] is not None: + if "role_name" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") @@ -3080,15 +2946,15 @@ def verify_diff_deleted(self, config): if not role_exist: self.status = "success" - msg = """The requested role {0} has already been deleted from the Cisco Catalyst Center and this has been - successfully verified.""".format(str(self.want.get("role_name"))) + msg = "The requested role {0} has already been deleted from the Cisco Catalyst Center and this has been \ + successfully verified.".format(str(self.want.get("role_name"))) self.log(msg, "INFO") return self - self.log("""Mismatch between the playbook input for role {0} and the Cisco Catalyst Center indicates that the deletion was \ - not executed successfully.""".format(str(self.want.get("role_name"))), "INFO") + self.log("Mismatch between the playbook input for role {0} and the Cisco Catalyst Center indicates that the deletion was \ + not executed successfully.".format(str(self.want.get("role_name"))), "INFO") - elif config["username"] is not None or config["email"] is not None: + if "username" in config or "email" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") self.log("Desired State (want): {0}".format(str(self.want)), "INFO") @@ -3097,13 +2963,13 @@ def verify_diff_deleted(self, config): if not user_exist: self.status = "success" - msg = """The requested user {0} has already been deleted from the Cisco Catalyst Center and this has been \ - successfully verified.""".format(str(self.want.get("username"))) + msg = "The requested user {0} has already been deleted from the Cisco Catalyst Center and this has been \ + successfully verified.".format(str(self.want.get("username"))) self.log(msg, "INFO") return self - self.log("""Mismatch between the playbook input for user {0} and the Cisco Catalyst Center indicates that the deletion \ - was not executed successfully.""".format(str(self.want.get("username"))), "INFO") + self.log("Mismatch between the playbook input for user {0} and the Cisco Catalyst Center indicates that the deletion \ + was not executed successfully.".format(str(self.want.get("username"))), "INFO") return self @@ -3120,8 +2986,10 @@ def snake_to_camel_case(self, data): - It handles nested dictionaries and lists, converting all keys in each dictionary found. Lists containing dictionaries are recursively processed to ensure all contained dictionaries have their keys converted. """ - def to_camel_case(snake_str): + """ + Helper function to convert snake to camel case. + """ components = snake_str.split("_") camel_case_str = components[0] for component in components[1:]: @@ -3133,30 +3001,15 @@ def to_camel_case(snake_str): for key, value in data.items(): new_key = to_camel_case(key) - if isinstance(value, dict): - camel_case_data[new_key] = self.snake_to_camel_case(value) - elif isinstance(value, list): + if isinstance(value, list): camel_case_list = [] for item in value: - if isinstance(item, dict): - camel_case_list.append(self.snake_to_camel_case(item)) - else: - camel_case_list.append(item) + camel_case_list.append(item) camel_case_data[new_key] = camel_case_list else: camel_case_data[new_key] = value return camel_case_data - elif isinstance(data, list): - camel_case_list = [] - for item in data: - if isinstance(item, dict): - camel_case_list.append(self.snake_to_camel_case(item)) - else: - camel_case_list.append(item) - return camel_case_list - else: - return data def main(): @@ -3190,11 +3043,6 @@ def main(): ccc_user_role = UserandRole(module) state = ccc_user_role.params.get("state") - if state not in ccc_user_role.supported_states: - ccc_user_role.status = "invalid" - ccc_user_role.msg = "State {0} is invalid".format(state) - ccc_user_role.check_return_status() - if "role_details" in ccc_user_role.params.get("config"): ccc_user_role.validate_input_yml(ccc_user_role.params.get("config").get("role_details")).check_return_status() config_verify = ccc_user_role.params.get("config_verify") diff --git a/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml b/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml index a00147a168..c29990dd1b 100644 --- a/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml +++ b/tests/integration/ccc_user_role_workflow_manager/tests/test_user_role_workflow_manager.yml @@ -26,30 +26,6 @@ # - debug: # msg: "{{ vars_map. }}" -############################################# -# Clean Up # -############################################# - - - name: Delete user - cisco.dnac.user_role_workflow_manager: - <<: *dnac_login - state: deleted - config: - user_details: - - "{{ item }}" - loop: "{{ vars_map.delete_user }}" - register: result_deleted_user - - - name: Delete role - cisco.dnac.user_role_workflow_manager: - <<: *dnac_login - state: deleted - config: - role_details: - - "{{ item }}" - loop: "{{ vars_map.delete_role }}" - register: result_deleted_role - ############################################# # CREATE USER # ############################################# diff --git a/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml b/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml index bd79553fc3..a6ee4b9821 100644 --- a/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml +++ b/tests/integration/ccc_user_role_workflow_manager/vars/vars_user_role_workflow_manager.yml @@ -1,14 +1,14 @@ --- create_user: - - first_name: "syed" - last_name: "Khadeer" - username: "syedkhadeer" - email: "syedkhadeer@example.com" - password: "Syed@123" + - first_name: "TestFirstName" + last_name: "TestLastName" + username: "testusername" + email: "testuser@example.com" + password: "Test@123" role_list: ["Super-Admin-Role"] create_role: - - role_name: "Test_Role_1" + - role_name: "IT_Test_Role" description: "Role creation" assurance: - overall: "read" @@ -44,13 +44,13 @@ create_role: audit_log: "read" update_user: - - first_name: "syed" - last_name: "Khadeer-ahmed" - username: "syedkhadeer" + - first_name: "TestFirstName_update" + last_name: "TestLastName_update" + username: "testusername" role_list: ["Observer-Role"] update_role: - - role_name: "Test_Role_1" + - role_name: "IT_Test_Role" description: "Role updation" network_analytics: - overall: "write" @@ -58,7 +58,7 @@ update_role: - overall: "write" delete_user: - - username: "syedkhadeer" + - username: "testusername" delete_role: - - role_name: "Test_Role_1" + - role_name: "IT_Test_Role" diff --git a/tests/unit/modules/dnac/dnac_module.py b/tests/unit/modules/dnac/dnac_module.py index 2a2ee78ced..8dc3cce8bc 100644 --- a/tests/unit/modules/dnac/dnac_module.py +++ b/tests/unit/modules/dnac/dnac_module.py @@ -28,7 +28,6 @@ from ansible_collections.ansible.netcommon.tests.unit.modules.utils import ( set_module_args as _set_module_args, ) -from unittest.mock import patch def set_module_args(args): @@ -50,7 +49,7 @@ def loadPlaybookData(module_name): j_data = json.loads(data) except Exception as e: print(e) - pass + j_data = {} return j_data @@ -76,107 +75,9 @@ def load_fixture(module_name, name, device=""): class TestDnacModule(ModuleTestCase): - - def __init__(self, module): - - """ - Initialize an instance of class . - - Parameters: - - module (ModuleType): The Python module associated with this instance. - - Attributes: - - module (ModuleType): The provided module. - - test_data (dict): The loaded playbook data from the module. - - playbook_config (dict): The playbook configuration. - - playbook_config_missing_param (dict): The playbook configuration with missing parameters. - """ - - self.module = module - self.test_data = self.loadPlaybookData(str(self.module.__name__)) - self.playbook_config = self.test_data.get("playbook_config") - self.playbook_config_missing_param = self.test_data.get("playbook_config_missing_param") - - def setUp(self): - - """ - Set up the test environment by mocking Cisco DNA Center SDK initialization and execution. - This method is automatically called before each test case to ensure a clean and controlled environment. - Mocks the initialization and execution of the Cisco DNA Center SDK to isolate testing from actual SDK operations. - - Mocked attributes: - - mock_dnac_init: Mocks the initialization of the DNACSDK class. - - run_dnac_init: The started mock for DNACSDK initialization. - - mock_dnac_exec: Mocks the execution of DNACSDK methods. - - run_dnac_exec: The started mock for DNACSDK method execution. - """ - - self.mock_dnac_init = patch( - "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.__init__") - self.run_dnac_init = self.mock_dnac_init.start() - self.run_dnac_init.side_effect = [None] - self.mock_dnac_exec = patch( - "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.exec" - ) - self.run_dnac_exec = self.mock_dnac_exec.start() - - def tearDown(self): - - """ - Clean up the test environment by stopping the mocked Cisco DNA Center SDK initialization and execution. - This method is automatically called after each test case to clean up any resources or mocks created during testing. - Stops the mock instances of the Cisco DNA Center SDK initialization and execution. - """ - - self.mock_dnac_exec.stop() - self.mock_dnac_init.stop() - - def loadPlaybookData(self, module): - - """ - Load JSON data from a file. - - Parameters: - - module (str): The name of the module used to construct the filename. - - Returns: - - dict: The loaded JSON data. - - Raises: - - FileNotFoundError: If the file does not exist. - - json.JSONDecodeError: If there is an error decoding the JSON data. - """ - - file_path = os.path.join(fixture_path, "{0}.json".format(module)) - print(file_path) - try: - with open(file_path) as f: - data = f.read() - j_data = json.loads(data) - except Exception as e: - print(e) - pass - - return j_data - def execute_module_devices( self, failed=False, changed=False, response=None, sort=True, defaults=False ): - - """ - This method executes a module for a single device. - - Parameters: - - failed (bool, optional): If True, check for failures. Defaults to False. - - changed (bool, optional): If True, check for changes. Defaults to False. - - response (list, optional): The expected response data. Defaults to None. - - sort (bool, optional): If True, sort the response data before comparison. Defaults to True. - - device (str, optional): The device to execute the module on. Defaults to an empty string. - - Returns: - - dict: A dictionary containing the execution result. - """ - module_name = self.module.__name__.rsplit(".", 1)[1] local_fixture_path = os.path.join(fixture_path, module_name) @@ -200,22 +101,6 @@ def execute_module( self, failed=False, changed=False, response=None, sort=True, device="" ): - """ - Execute a module for a specific device and perform validation. - - This method executes the module for a specific device, performs validation checks, and returns the result. - - Parameters: - - failed (bool, optional): If True, check for failures. Defaults to False. - - changed (bool, optional): If True, check for changes. Defaults to False. - - response (list, optional): The expected response data. Defaults to None. - - sort (bool, optional): If True, sort the response data before comparison. Defaults to True. - - device (str, optional): The device to execute the module on. Defaults to an empty string. - - Returns: - - dict: A dictionary containing the execution result, including 'failed', 'changed', and 'response' keys. - """ - self.load_fixtures(response, device=device) if failed: @@ -236,14 +121,6 @@ def execute_module( return result def failed(self): - - """ - Check for failures during module execution. - - Returns: - - dict: A dictionary containing the failure status and additional information. - """ - with self.assertRaises(AnsibleFailJson) as exc: self.module.main() @@ -252,20 +129,12 @@ def failed(self): return result def changed(self, changed=False): - - """ - Check for changes during module execution. - - Parameters: - - changed (bool, optional): If True, check for changes. Defaults to False. - - Returns: - - dict: A dictionary containing the change status and additional information. - """ - with self.assertRaises(AnsibleExitJson) as exc: self.module.main() result = exc.exception.args[0] self.assertEqual(result["changed"], changed, result) return result + + def load_fixtures(self, response=None, device=""): + pass diff --git a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json new file mode 100644 index 0000000000..6b2bd03fb2 --- /dev/null +++ b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json @@ -0,0 +1,1473 @@ +{ + "playbook_config_user": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "username": "ajithandrewj", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_delete_existing_user": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_mandatory_field_not_present": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "email": "ajith.andrew@example.com" + }] + }, + "playbook_config_invalid_param_username_email_not_present": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew" + }] + }, + "playbook_config_invalid_param_username_not_correct_formate": { + "user_details": [{ + "first_name": "ajith ", + "last_name": "andrew ", + "username": "ajithandrewj ", + "email": "ajith.andrewexample.com", + "password": "Ajith123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_firstname_not_correct_formate": { + "user_details": [{ + "first_name": "ajith ", + "last_name": "andrew", + "username": "ajithandrewj", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_lastname_not_correct_formate": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew ", + "username": "ajithandrewj", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_email_not_correct_formate": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "username": "ajithandrewj", + "email": "ajith.andrewexample.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_password_not_correct_formate": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "username": "ajithandrewj", + "email": "ajith.andrew@example.com", + "password": "Ajith123", + "role_list": ["Super-Admin-Role"] + }] + }, + "playbook_config_invalid_param_user_rolelist_not_type_list": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "username": "ajithandrewj&", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": "Super-Admin-Role" + }] + }, + "playbook_config_user_invalid_param_rolelist_not_found": { + "user_details": [{ + "first_name": "ajith", + "last_name": "andrew", + "username": "ajithandrewj", + "email": "ajith.andrew@example.com", + "password": "Ajith@123", + "role_list": ["Super-Admin-Roleee"] + }] + }, + "create_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "create_user_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "create_user_response":{ + "message": "User created successfully", + "userId": "6694f2696bfb96588e776b6a" + }, + "update_needed_get_user_response":{ + "response": { + "users": [{ + "firstName": "ajith-b", + "lastName": "andrew-b", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be62111" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "ajith.andrew-b@example.com", + "username": "ajithandrewj" + }] + } + }, + "update_user_needed_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "update_needed_user_response":{ + "message": "User updated successfully" + }, + "update_not_needed_get_user_response":{ + "response": { + "users": [{ + "firstName": "ajith", + "lastName": "andrew", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "ajith.andrew@example.com", + "username": "ajithandrewj" + }] + } + }, + "update_user_not_needed_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "update_not_needed_user_response":{ + "message": "User does not need any update" + }, + "delete_existing_get_user_response":{ + "response": { + "users": [{ + "firstName": "ajith", + "lastName": "andrew", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "ajith.andrew@example.com", + "username": "ajithandrewj" + }] + } + }, + "delete_existing_user_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "delete_existing_user_response":{ + "message": "Deleted user successfully" + }, + "delete_non_existing_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "delete_non_existing_user_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "delete_non_existing_user_response":{ + "message": "Please provide a valid username or email for user deletion" + }, + "invalid_param_mandatory_field_not_present_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "invalid_param_mandatory_field_not_present_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "user_invalid_mandatory_field_not_present_param_responce":{ + "message": "Mandatory field not present: An error occurred while creating the user" + }, + "invalid_param_username_email_not_present_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "invalid_param_username_email_not_present_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "user_invalid_username_email_not_present_param_responce":{ + "message": "Configuration params like username or email or role_name is not available in the playbook" + }, + "invalid_param_not_correct_formate_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "invalid_param_not_correct_formate_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "user_invalid_param_not_correct_formate_responce":{ + "message": "Invalid parameters in playbook config: first_name: 'first_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., last_name: 'last_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., email: Invalid email format for 'email': ajith.andrewexample.com, password: 'Password' does not meet complexity requirements for password: ajith.andrewexample.com, username: 'Username' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + }, + "user_invalid_param_not_type_list_response":{ + "message": "Invalid parameter(s) found in playbook: Super-Admin-Role : is not a valid list" + }, + "invalid_param_rolelist_not_found_get_user_response":{ + "response": { + "users": [{ + "firstName": "syed", + "lastName": "khadeer", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "syed@example.com", + "username": "syedkhadeer" + }] + } + }, + "invalid_param_rolelist_not_found_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "user_invalid_param_rolelist_not_found_responce":{ + "message": "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" + }, + "invalid_param_update_rolelist_not_found_get_user_response":{ + "response": { + "users": [{ + "firstName": "ajith", + "lastName": "andrew", + "authSource": "internal", + "passphraseUpdateTime": "1712759668555", + "roleList": [ + "6486ce97ff1f0d0c8be622f6" + ], + "userId": "6486ce98ff1f0d0c8be622f7", + "email": "ajith.andrew@example.com", + "username": "ajithandrewj" + }] + } + }, + "user_invalid_param_update_rolelist_not_found_responce":{ + "message": "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" + }, + "playbook_config_role": { + "role_details": [{ + "role_name": "Test_Role_1", + "description": "Default role creation", + "assurance": [ + { + "overall": "write", + "monitoring_and_troubleshooting": "write", + "monitoring_settings": "write", + "troubleshooting_tools": "read" + } + ], + "network_analytics": [ + { + "overall": "read", + "data_access": "read" + } + ], + "network_design": [ + { + "overall": "write", + "advanced_network_settings": "write", + "image_repository": "write", + "network_hierarchy": "write", + "network_profiles": "read", + "network_settings": "read", + "virtual_network": "read" + } + ], + "network_provision": [ + { + "overall": "write", + "compliance": "write", + "eox": "write", + "image_update": "read", + "inventory_management": [ + { + "overall": "write", + "device_configuration": "write", + "discovery": "read", + "network_device": "write", + "port_management": "read", + "topology": "write" + } + ], + "license": "write", + "network_telemetry": "write", + "pnp": "read", + "provision": "read" + } + ], + "network_services": [ + { + "overall": "write", + "app_hosting": "write", + "bonjour": "write", + "stealthwatch": "read", + "umbrella": "write" + } + ], + "platform": [ + { + "overall": "write", + "apis": "write", + "bundles": "read", + "events": "read", + "reports": "write" + } + ], + "security": [ + { + "overall": "write", + "group_based_policy": "read", + "ip_based_access_control": "read", + "security_advisories": "read" + } + ], + "system": [ + { + "overall": "write", + "machine_reasoning": "read", + "system_management": "write" + } + ], + "utilities": [ + { + "overall": "write", + "audit_log": "read", + "event_viewer": "read", + "network_reasoner": "write", + "remote_device_support": "write", + "scheduler": "write", + "search": "write" + } + ] + }] + }, + "playbook_config_1_role": { + "role_details": [ + { + "role_name": "Test_Role_1", + "assurance": [ + { + "overall": "deny", + "monitoring_and_troubleshooting": null, + "monitoring_settings": "write", + "troubleshooting_tools": "read" + } + ], + "network_analytics": [ + { + "data_access": null + } + ], + "network_design": [ + { + "overall": "deny", + "advanced_network_settings": "write", + "image_repository": "write", + "network_hierarchy": null, + "network_profiles": "read", + "network_settings": "deny", + "virtual_network": "read" + } + ], + "network_provision": [ + { + "overall": "deny", + "compliance": null, + "eox": "write", + "image_update": "read", + "inventory_management": [ + { + "overall": "write", + "device_configuration": "write", + "discovery": "read", + "network_device": "write", + "port_management": "read", + "topology": null + } + ], + "license": "write", + "network_telemetry": "write", + "pnp": "read", + "provision": "deny" + } + ], + "network_services": [ + { + "overall": "write", + "app_hosting": "write", + "bonjour": "write", + "stealthwatch": null, + "umbrella": "write" + } + ], + "platform": [ + { + "overall": "write", + "apis": "write", + "bundles": "read", + "events": "read", + "reports": null + } + ], + "security": [ + { + "overall": "deny", + "group_based_policy": "deny", + "ip_based_access_control": "read", + "security_advisories": null + } + ], + "system": [ + { + "overall": "write", + "machine_reasoning": "read", + "system_management": null + } + ], + "utilities": [ + { + "overall": "write", + "audit_log": "read", + "event_viewer": "read", + "network_reasoner": "write", + "remote_device_support": "write", + "scheduler": "write", + "search": null + } + ] + } + ] + }, + "playbook_config_invalid_param_rolename_not_present": { + "role_details": [{ + "description": "Default role creation" + }] + }, + "playbook_config_invalid_param_role_not_type_list": { + "role_details": [{ + "role_name": "Test_Role_1", + "description": "Default role creation", + "assurance": + { + "overall": "read" + } + }] + }, + "playbook_config_invalid_param_with_all_permision_deny": { + "role_details": [{ + "role_name": "Test_Role_1", + "description": "Default role creation", + "assurance": [ + { + "overall": "deny" + } + ], + "network_analytics": [ + { + "overall": "deny" + } + ], + "network_design": [ + { + "overall": "deny" + } + ], + "network_provision": [ + { + "overall": "deny", + "inventory_management": [ + { + "overall": "deny" + } + ] + } + ], + "network_services": [ + { + "overall": "deny" + } + ], + "platform": [ + { + "overall": "deny" + } + ], + "security": [ + { + "overall": "deny" + } + ], + "system": [ + { + "overall": "deny" + } + ], + "utilities": [ + { + "overall": "deny" + } + ] + }] + }, + "playbook_config_invalid_param_rolename_not_correct_formate": { + "role_details": [{ + "role_name": "Test_Role_1 ", + "description": "Default role creation", + "assurance": [ + { + "overall": "read" + } + ] + }] + }, + "playbook_config_invalid_param_type_list_missing":{ + "role_details": { + "role_name": "Test_Role_1 ", + "description": "Default role creation", + "assurance": [ + { + "overall": "read" + } + ] + } + }, + "playbook_config_invalid_param_role_invalid_permission":{ + "role_details": [{ + "role_name": "Test_Role_1", + "description": "Default role creation", + "assurance": [ + { + "overall": "aaa" + } + ] + }] + }, + "playbook_config_invalid_invalid_param_state":{ + "role_details": [{ + "role_name": "Test_Role_1", + "description": "Default role creation", + "assurance": [ + { + "overall": "aaa" + } + ] + }] + }, + "create_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "create_role_response":{ + "message": "Role created successfully", + "roleId": "6694f2696bfb96588e776b6a" + }, + "create_1_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "create_1_role_response":{ + "message": "Role created successfully", + "roleId": "6694f2696bfb96588e776b6a" + }, + "update_needed_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "Test_Role_1", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "update_needed_role_response":{ + "message": "Role Updated successfully", + "roleId": "6694f2696bfb96588e776b6a" + }, + "update_not_needed_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Assurance.Monitoring and Troubleshooting" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Assurance.Monitoring Settings" + }, + { + "operations": [ + "gRead" + ], + "type": "Assurance.Troubleshooting Tools" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Analytics.Data Access" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Design.Advanced Network Settings" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Design.Image Repository" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Design.Network Hierarchy" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Design.Network Profiles" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Design.Network Settings" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Design.Virtual Network" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.Compliance" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.EoX" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Provision.Image Update" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.Inventory Management.Device Configuration" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Provision.Inventory Management.Discovery" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.Inventory Management.Network Device" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Provision.Inventory Management.Port Management" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.Inventory Management.Topology" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.License" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Provision.Network Telemetry" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Provision.PnP" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Provision.Provision" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Services.App Hosting" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Services.Bonjour" + }, + { + "operations": [ + "gRead" + ], + "type": "Network Services.Stealthwatch" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Network Services.Umbrella" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Platform.APIs" + }, + { + "operations": [ + "gRead" + ], + "type": "Platform.Bundles" + }, + { + "operations": [ + "gRead" + ], + "type": "Platform.Events" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Platform.Reports" + }, + { + "operations": [ + "gRead" + ], + "type": "Security.Group-Based Policy" + }, + { + "operations": [ + "gRead" + ], + "type": "Security.IP Based Access Control" + }, + { + "operations": [ + "gRead" + ], + "type": "Security.Security Advisories" + }, + { + "operations": [ + "gRead" + ], + "type": "System.Machine Reasoning" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "System.System Management" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Utilities.Scheduler" + }, + { + "operations": [ + "gRead" + ], + "type": "Utilities.Event Viewer" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Utilities.Network Reasoner" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Utilities.Search" + }, + { + "operations": [ + "gRead" + ], + "type": "Utilities.Audit Log" + }, + { + "operations": [ + "gRead", + "gUpdate", + "gCreate", + "gRemove" + ], + "type": "Utilities.Remote Device Support" + } + ], + "meta": { + "createdBy": "admin", + "created": "1721628945568", + "lastModified": null + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "Test_Role_1", + "description": "Default role creation", + "type": "CUSTOM" + }] + } + }, + "update_not_needed_role_response":{ + "message": "Role does not need any update" + }, + "delete_existing_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Assurance" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "Test_Role_1", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "delete_existing_role_response":{ + "message": "Role deleted successfully" + }, + "delete_non_existing_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Utilities" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f7", + "name": "Test_Role_2", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "delete_non_existing_role_response":{ + "message": "Please provide a valid role_name for role deletion" + }, + "role_invalid_rolename_not_present_param_response":{ + "message": "Configuration params like username or email or role_name is not available in the playbook" + }, + "role_invalid_param_not_type_list_response":{ + "message": "Invalid parameter(s) found in playbook: {'overall': 'read'} : is not a valid list" + }, + "role_param_with_all_permision_deny_get_role_responce":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Utilities" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f7", + "name": "Test_Role_2", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "role_param_with_all_permision_deny_responce":{ + "message": "An error occurred while creating the role without access-level parameters and permissions" + }, + "invalid_param_rolename_not_correct_formate_get_role_responce":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Utilities" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f7", + "name": "Test_Role_2", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "role_invalid_param_rolename_not_correct_formate_responce":{ + "message": "Invalid parameters in playbook config: Role name: 'role_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + }, + "invalid_param_type_list_missing_response":{ + "message": "Configuration is not available in the playbook for validation or user/role details are not type list" + }, + "invalid_param_invalid_permission_role_get_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Utilities" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f7", + "name": "Test_Role_2", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "invalid_param_invalid_permission_update_role_get_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead" + ], + "type": "Utilities" + + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f7", + "name": "Test_Role_1", + "description": "Default role creation", + "type": "CUSTOM" + }] + } + }, + "invalid_param_role_invalid_permission_response":{ + "message": "Invalid permission aaa for assurance resource overall" + }, + "invalid_param_role_update_invalid_permission_response":{ + "message": "Invalid permission aaa for assurance resource overall" + }, + "playbook_config_for_creating_default_role": { + "role_details": [{ + "role_name": "default_role", + "description": "Default role creation" + }] + }, + "create_default_get_role_response":{ + "response": { + "roles": [{ + "resourceTypes": [ + { + "operations": [ + "gRead", + "gCreate", + "gUpdate", + "gRemove" + ], + "type": "Utilities.Search" + } + ], + "meta": { + "createdBy": "admin", + "created": "1717390142690", + "lastModified": "1717390238774" + }, + "roleId": "6486ce97ff1f0d0c8be622f6", + "name": "SUPER-ADMIN-ROLE", + "description": "For LTTS Team", + "type": "CUSTOM" + }] + } + }, + "create_default_role_response":{ + "message": "Role created successfully", + "roleId": "6694f2696bfb96588e776b6e" + }, + "invalid_param_state_responce":{ + "message": "value of state must be one of: merged, deleted, got: mergeddd" + } +} diff --git a/tests/unit/modules/dnac/test_user_role_workflow_manager.py b/tests/unit/modules/dnac/test_user_role_workflow_manager.py new file mode 100644 index 0000000000..94c17522b1 --- /dev/null +++ b/tests/unit/modules/dnac/test_user_role_workflow_manager.py @@ -0,0 +1,811 @@ +# Copyright (c) 2020 Cisco and/or its affiliates. + +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at + +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +# Make coding more python3-ish + +from __future__ import absolute_import, division, print_function + +__metaclass__ = type + +from unittest.mock import patch + +from ansible_collections.cisco.dnac.plugins.modules import user_role_workflow_manager +from .dnac_module import TestDnacModule, set_module_args, loadPlaybookData + + +class TestDnacUserRoleWorkflowManager(TestDnacModule): + + module = user_role_workflow_manager + + test_data = loadPlaybookData("user_role_workflow_manager") + + playbook_config_user = test_data.get("playbook_config_user") + playbook_config_delete_existing_user = test_data.get("playbook_config_delete_existing_user") + playbook_config_invalid_param_mandatory_field_not_present = test_data.get("playbook_config_invalid_param_mandatory_field_not_present") + playbook_config_invalid_param_username_email_not_present = test_data.get("playbook_config_invalid_param_username_email_not_present") + playbook_config_invalid_param_username_not_correct_formate = test_data.get("playbook_config_invalid_param_username_not_correct_formate") + playbook_config_invalid_param_user_rolelist_not_type_list = test_data.get("playbook_config_invalid_param_user_rolelist_not_type_list") + playbook_config_invalid_param_firstname_not_correct_formate = test_data.get("playbook_config_invalid_param_firstname_not_correct_formate") + playbook_config_invalid_param_lastname_not_correct_formate = test_data.get("playbook_config_invalid_param_lastname_not_correct_formate") + playbook_config_invalid_param_email_not_correct_formate = test_data.get("playbook_config_invalid_param_email_not_correct_formate") + playbook_config_invalid_param_password_not_correct_formate = test_data.get("playbook_config_invalid_param_password_not_correct_formate") + playbook_config_user_invalid_param_rolelist_not_found = test_data.get("playbook_config_user_invalid_param_rolelist_not_found") + playbook_config_role = test_data.get("playbook_config_role") + playbook_config_1_role = test_data.get("playbook_config_1_role") + playbook_config_invalid_param_rolename_not_present = test_data.get("playbook_config_invalid_param_rolename_not_present") + playbook_config_invalid_param_role_not_type_list = test_data.get("playbook_config_invalid_param_role_not_type_list") + playbook_config_invalid_param_with_all_permision_deny = test_data.get("playbook_config_invalid_param_with_all_permision_deny") + playbook_config_invalid_param_rolename_not_correct_formate = test_data.get("playbook_config_invalid_param_rolename_not_correct_formate") + playbook_config_invalid_param_type_list_missing = test_data.get("playbook_config_invalid_param_type_list_missing") + playbook_config_invalid_param_role_invalid_permission= test_data.get("playbook_config_invalid_param_role_invalid_permission") + playbook_config_for_creating_default_role = test_data.get("playbook_config_for_creating_default_role") + playbook_config_invalid_invalid_param_state = test_data.get("playbook_config_invalid_invalid_param_state") + + def setUp(self): + super(TestDnacUserRoleWorkflowManager, self).setUp() + + self.mock_dnac_init = patch( + "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK.__init__") + self.run_dnac_init = self.mock_dnac_init.start() + self.run_dnac_init.side_effect = [None] + self.mock_dnac_exec = patch( + "ansible_collections.cisco.dnac.plugins.module_utils.dnac.DNACSDK._exec" + ) + self.run_dnac_exec = self.mock_dnac_exec.start() + + def tearDown(self): + super(TestDnacUserRoleWorkflowManager, self).tearDown() + self.mock_dnac_exec.stop() + self.mock_dnac_init.stop() + + + def load_fixtures(self, response=None, device=""): + """ + Load fixtures for user. + """ + if "create_user" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("create_get_user_response"), + self.test_data.get("create_user_get_role_response"), + self.test_data.get("create_user_response") + ] + elif "user_update_needed" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("update_needed_get_user_response"), + self.test_data.get("update_user_needed_get_role_response"), + self.test_data.get("update_needed_user_response") + ] + if "user_update_not_needed" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("update_not_needed_get_user_response"), + self.test_data.get("update_user_not_needed_get_role_response"), + self.test_data.get("update_not_needed_user_response") + ] + elif "delete_existing_user" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("delete_existing_get_user_response"), + self.test_data.get("delete_existing_user_get_role_response"), + self.test_data.get("delete_existing_user_response") + ] + elif "delete_non_existing_user" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("delete_non_existing_get_user_response"), + self.test_data.get("delete_non_existing_user_get_role_response"), + self.test_data.get("delete_non_existing_user_response") + ] + elif "user_invalid_mandatory_field_not_present_param" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_mandatory_field_not_present_get_user_response"), + self.test_data.get("invalid_param_mandatory_field_not_present_get_role_response"), + Exception(), + self.test_data.get("user_invalid_mandatory_field_not_present_param_responce") + ] + elif "user_invalid_username_email_not_present_param" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("user_invalid_username_email_not_present_param_responce") + ] + elif "user_invalid_param_not_correct_formate" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_not_correct_formate_get_user_response"), + self.test_data.get("invalid_param_not_correct_formate_get_role_response"), + self.test_data.get("user_invalid_param_not_correct_formate_responce") + ] + elif "user_invalid_param_not_type_list" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("user_invalid_param_not_type_list_response") + ] + elif "user_invalid_param_rolelist_not_found" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_rolelist_not_found_get_user_response"), + self.test_data.get("invalid_param_rolelist_not_found_get_role_response"), + self.test_data.get("user_invalid_param_rolelist_not_found_responce") + ] + elif "user_invalid_param_update_rolelist_not_found" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_update_rolelist_not_found_get_user_response"), + self.test_data.get("invalid_param_rolelist_not_found_get_role_response"), + self.test_data.get("user_invalid_param_update_rolelist_not_found_responce") + ] + elif "create_role" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("create_get_role_response"), + self.test_data.get("create_role_response") + ] + elif "create_1_role" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("create_1_get_role_response"), + self.test_data.get("create_1_role_response") + ] + elif "role_update_needed" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("update_needed_get_role_response"), + self.test_data.get("update_needed_role_response") + ] + elif "role_update_not_needed" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("update_not_needed_get_role_response"), + self.test_data.get("update_not_needed_role_response") + ] + elif "delete_existing_role" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("delete_existing_get_role_response"), + self.test_data.get("delete_existing_role_response") + ] + elif "delete_non_existing_role" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("delete_non_existing_get_role_response"), + self.test_data.get("delete_non_existing_role_response") + ] + elif "role_invalid_param_rolename_not_present" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("role_invalid_rolename_not_present_param_response") + ] + elif "role_invalid_param_not_type_list" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("role_invalid_param_not_type_list_response") + ] + elif "role_param_with_all_permision_deny" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("role_param_with_all_permision_deny_get_role_responce"), + Exception(), + self.test_data.get("role_param_with_all_permision_deny_responce") + ] + elif "role_invalid_param_rolename_not_correct_formate" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_rolename_not_correct_formate_get_role_responce"), + self.test_data.get("role_invalid_param_rolename_not_correct_formate_responce") + ] + elif "invalid_param_type_list_missing" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_type_list_missing_response") + ] + elif "invalid_param_role_invalid_permission" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_invalid_permission_role_get_response"), + self.test_data.get("invalid_param_role_invalid_permission_response") + ] + elif "invalid_param_role_update_invalid_permission" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_invalid_permission_update_role_get_response"), + self.test_data.get("invalid_param_role_update_invalid_permission_response") + ] + elif "create_default_role" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("create_default_get_role_response"), + self.test_data.get("create_default_role_response") + ] + elif "invalid_param_state" in self._testMethodName: + self.run_dnac_exec.side_effect = [ + self.test_data.get("invalid_param_state_responce"), + ] + + def test_user_role_workflow_manager_create_user(self): + """ + Test case for user role workflow manager when creating a user. + + This test case checks the behavior of the user workflow when creating a new user in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_user + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "User created successfully" + ) + + def test_user_role_workflow_manager_user_update_needed(self): + """ + Test case for user role workflow manager when updating a user. + + This test case checks the behavior of the user workflow when updating a user in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_user + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "User updated successfully" + ) + + def test_user_role_workflow_manager_user_update_not_needed(self): + """ + Test case for user role workflow manager when user update not needed. + + This test case checks the behavior of the user workflow when user update not needed in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_user + ) + ) + result = self.execute_module(changed=False, failed=False) + print(result) + self.assertEqual( + result.get('response'), + "User does not need any update" + ) + + def test_user_role_workflow_manager_delete_existing_user(self): + """ + Test case for user role workflow manager when deleting a user. + + This test case checks the behavior of the user workflow when deleting a user in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="deleted", + config=self.playbook_config_delete_existing_user + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("users_operation").get("response").get("message"), + "Deleted user successfully" + ) + + def test_user_role_workflow_manager_delete_non_existing_user(self): + """ + Test case for user role workflow manager when deleting a non existing user. + + This test case checks the behavior of the user workflow when deleting a non existing user in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="deleted", + config=self.playbook_config_user + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Please provide a valid username or email for user deletion" + ) + + def test_user_role_workflow_manager_user_invalid_mandatory_field_not_present_param(self): + """ + Test case for user workflow manager when invalid user param given. + + This test case checks the behavior of the user workflow when invalid user param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_mandatory_field_not_present + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Mandatory field not present: An error occurred while creating the user" + ) + + def test_user_role_workflow_manager_user_invalid_username_email_not_present_param(self): + """ + Test case for user workflow manager when invalid user param given. + + This test case checks the behavior of the user workflow when invalid user param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_username_email_not_present + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Configuration params like username or email or role_name is not available in the playbook" + ) + + def test_user_role_workflow_manager_user_invalid_param_not_correct_formate(self): + """ + Test case for user workflow manager when invalid user param given. + + This test case checks the behavior of the user workflow when invalid user param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_username_not_correct_formate + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Invalid parameters in playbook config: first_name: 'first_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., last_name: 'last_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., email: Invalid email format for 'email': ajith.andrewexample.com, password: 'Password' does not meet complexity requirements for password: ajith.andrewexample.com, username: 'Username' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + ) + + def test_user_role_workflow_manager_user_invalid_param_not_type_list(self): + """ + Test case for user role workflow manager when invalid user param given. + + This test case checks the behavior of the role workflow when invalid user param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_user_rolelist_not_type_list + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "Invalid parameter(s) found in playbook: Super-Admin-Role : is not a valid list" + ) + + def test_user_role_workflow_manager_user_invalid_param_rolelist_not_found(self): + """ + Test case for user role workflow manager when invalid user param given. + + This test case checks the behavior of the role workflow when invalid user param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_user_invalid_param_rolelist_not_found + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" + ) + + def test_user_role_workflow_manager_user_invalid_param_update_rolelist_not_found(self): + """ + Test case for user role workflow manager when invalid user param given. + + This test case checks the behavior of the role workflow when invalid user param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_user_invalid_param_rolelist_not_found + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" + ) + + def test_user_role_workflow_manager_create_role(self): + """ + Test case for user role workflow manager when creating a role. + + This test case checks the behavior of the role workflow when creating a new role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_role + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "Role created successfully" + ) + + def test_user_role_workflow_manager_create_1_role(self): + """ + Test case for user role workflow manager when creating a role. + + This test case checks the behavior of the role workflow when creating a new role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_1_role + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "Role created successfully" + ) + + def test_user_role_workflow_manager_role_update_needed(self): + """ + Test case for user role workflow manager when update for a role is needed. + + This test case checks the behavior of the role workflow when updating a existing role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_role + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "Role Updated successfully" + ) + + def test_user_role_workflow_manager_role_update_not_needed(self): + """ + Test case for user role workflow manager when update is not needed for a role . + + This test case checks the behavior of the role workflow when update is not needed for a role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_role + ) + ) + result = self.execute_module(changed=False, failed=False) + print(result) + self.assertEqual( + result.get('response'), + "Role does not need any update" + ) + + def test_user_role_workflow_manager_delete_existing_role(self): + + + """ + Test case for user role workflow manager when deleting a role. + + This test case checks the behavior of the role workflow when deleting a role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="deleted", + config=self.playbook_config_role + ) + ) + result = self.execute_module(changed=True, failed=False) + print(result) + self.assertEqual( + result.get('response').get("role_operation").get("response").get("message"), + "Role deleted successfully" + ) + + def test_user_role_workflow_manager_delete_non_existing_role(self): + """ + Test case for user role workflow manager when deleting a non existing role. + + This test case checks the behavior of the role workflow when deleting a non existing role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="deleted", + config=self.playbook_config_role + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "Please provide a valid role_name for role deletion" + ) + + def test_user_role_workflow_manager_role_invalid_param_rolename_not_present(self): + """ + Test case for user role workflow manager when invalid role param given. + + This test case checks the behavior of the role workflow when invalid role param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_rolename_not_present + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "Configuration params like username or email or role_name is not available in the playbook" + ) + + def test_user_role_workflow_manager_role_invalid_param_not_type_list(self): + """ + Test case for user role workflow manager when invalid role param given. + + This test case checks the behavior of the role workflow when invalid role param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_role_not_type_list + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "Invalid parameter(s) found in playbook: {'overall': 'read'} : is not a valid list" + ) + + def test_user_role_workflow_manager_role_param_with_all_permision_deny(self): + """ + Test case for user role workflow manager when invalid role param given. + + This test case checks the behavior of the role workflow when invalid role param given in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_with_all_permision_deny + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get('msg'), + "An error occurred while creating the role without access-level parameters and permissions" + ) + + def test_user_role_workflow_manager_role_invalid_param_rolename_not_correct_formate(self): + """ + Test case for user workflow manager when invalid role param given. + + This test case checks the behavior of the user workflow when invalid role param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_rolename_not_correct_formate + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Invalid parameters in playbook config: Role name: 'role_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + ) + + def test_user_role_workflow_manager_invalid_param_type_list_missing(self): + """ + Test case for user workflow manager when invalid role param given. + + This test case checks the behavior of the user workflow when invalid role param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_type_list_missing + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Configuration is not available in the playbook for validation or user/role details are not type list" + ) + + def test_user_role_workflow_manager_invalid_param_role_invalid_permission(self): + """ + Test case for user workflow manager when invalid role param given. + + This test case checks the behavior of the user workflow when invalid role param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_role_invalid_permission + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Invalid permission aaa for assurance resource overall" + ) + + def test_user_role_workflow_manager_invalid_param_role_update_invalid_permission(self): + """ + Test case for user workflow manager when invalid role param given. + + This test case checks the behavior of the user workflow when invalid role param given in the specified Cisco Catalyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_invalid_param_role_invalid_permission + ) + ) + result = self.execute_module(changed=False, failed=True) + print(result) + self.assertEqual( + result.get("msg"), + "Invalid permission aaa for assurance resource overall" + ) + + def test_user_role_workflow_manager_create_default_role(self): + """ + Test case for user role workflow manager when update is not needed for a role . + + This test case checks the behavior of the role workflow when update is not needed for a role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="merged", + config=self.playbook_config_for_creating_default_role + ) + ) + result = self.execute_module(changed=True, failed=False) + print(f"result --> {result}") + self.assertEqual( + result.get('response').get("operation").get("response").get("message"), + "Role created successfully" + ) + + def test_user_role_workflow_manager_invalid_param_state(self): + """ + Test case for user role workflow manager when update is not needed for a role . + + This test case checks the behavior of the role workflow when update is not needed for a role in the specified Cisco Calyst Center. + """ + set_module_args( + dict( + dnac_host="1.1.1.1", + dnac_username="dummy", + dnac_password="dummy", + dnac_log=True, + state="mergeddd", + config=self.playbook_config_invalid_invalid_param_state + ) + ) + result = self.execute_module(changed=False, failed=True) + print(f"result --> {result}") + self.assertEqual( + result.get('msg'), + "value of state must be one of: merged, deleted, got: mergeddd" + ) From 4cb4c511fad2e3bd2d89fff45a48dab70c60d75e Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Thu, 25 Jul 2024 22:06:10 +0530 Subject: [PATCH 096/119] Fix the issue of exporting more than 800 devices in a batch of 500 at a time while updating devices, also fix the issue of creating email destination in fresh set up by handling the exception. --- ...ents_and_notifications_workflow_manager.py | 23 +++-- plugins/modules/inventory_intent.py | 81 +++++++++++------- plugins/modules/inventory_workflow_manager.py | 85 ++++++++++++------- 3 files changed, 120 insertions(+), 69 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 349259a8a3..2e0e28db76 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -1743,7 +1743,7 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): if update_snmp_params.get('port'): try: - port = int(snmp_params.get('port')) + port = int(update_snmp_params.get('port')) if port not in range(1, 65536): self.status = "failed" self.msg = "Invalid Notification trap port '{0}' given in playbook. Select port from the number range(1, 65535)".format(port) @@ -1753,7 +1753,7 @@ def update_snmp_destination(self, snmp_params, snmp_dest_detail_in_ccc): except Exception as e: self.status = "failed" self.msg = """Invalid datatype for the Notification trap port '{0}' given in playbook. Select port with correct datatype from the - number range(1, 65535).""".format(port) + number range(1, 65535).""".format(update_snmp_params.get('port')) self.log(self.msg, "ERROR") return self @@ -2116,6 +2116,12 @@ def get_email_destination_in_ccc(self): return response[0] except Exception as e: + if "Expecting value: line 1 column 1" in str(e): + self.log( + "Getting expection as Email destination is not configured in Cisco Catalyst" + " Center.", "WARNING" + ) + return None self.status = "failed" self.msg = "Error while getting the details of Email destination present in Cisco Catalyst Center: {0}".format(str(e)) self.log(self.msg, "ERROR") @@ -2598,13 +2604,16 @@ def update_itsm_integration_setting(self, itsm_params, itsm_in_ccc): update_itsm_params['data'] = {} update_itsm_params['data']['ConnectionSettings'] = {} + url_in_ccc = itsm_in_ccc.get('data').get('ConnectionSettings').get('Url') + username_in_ccc = itsm_in_ccc.get('data').get('ConnectionSettings').get('Auth_UserName') + if itsm_params.get('data') is None or itsm_params.get('data').get('ConnectionSettings') is None: - update_itsm_params['data']['ConnectionSettings']['Url'] = itsm_in_ccc.get('data').get('ConnectionSettings').get('Url') - update_itsm_params['data']['ConnectionSettings']['Auth_UserName'] = itsm_in_ccc.get('data').get('ConnectionSettings').get('Auth_UserName') + update_itsm_params['data']['ConnectionSettings']['Url'] = url_in_ccc + update_itsm_params['data']['ConnectionSettings']['Auth_UserName'] = username_in_ccc else: connection_params = itsm_params.get('data').get('ConnectionSettings') - update_itsm_params['data']['ConnectionSettings']['Url'] = connection_params.get('Url') - update_itsm_params['data']['ConnectionSettings']['Auth_UserName'] = connection_params.get('Auth_UserName') + update_itsm_params['data']['ConnectionSettings']['Url'] = connection_params.get('Url') or url_in_ccc + update_itsm_params['data']['ConnectionSettings']['Auth_UserName'] = connection_params.get('Auth_UserName') or username_in_ccc if not connection_params.get('Auth_Password'): self.status = "failed" @@ -4568,7 +4577,7 @@ def update_destination_notification_messages(self): result_msg_list.append(update_notf_msg) if self.no_update_notification: - no_update_notf_msg = "Event subscription notification(s) '{0}' needs no update in Cisco Catalyst Center.".format(self.no_update_notification) + no_update_notf_msg = "Event subscription notification(s) '{0}' need no update in Cisco Catalyst Center.".format(self.no_update_notification) result_msg_list.append(no_update_notf_msg) if self.delete_dest: diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index e4f8ec8c6d..be10012439 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -1195,34 +1195,44 @@ def export_device_details(self): self.result['response'] = self.msg return self - payload_params = { - "deviceUuids": device_uuids, - "password": password, - "operationEnum": export_device_list.get("operation_enum", "0"), - "parameters": export_device_list.get("parameters") - } - - response = self.trigger_export_api(payload_params) - self.check_return_status() + # Export the device data in a batch of 500 devices at a time + start = 0 + chunk_size = 500 + device_data = [] + first_run = True + + while start < len(device_uuids): + device_ids_list = device_uuids[start:start + chunk_size] + payload_params = { + "deviceUuids": device_ids_list, + "password": password, + "operationEnum": export_device_list.get("operation_enum", "0"), + "parameters": export_device_list.get("parameters") + } - if payload_params["operationEnum"] == "0": - temp_file_name = response.filename - output_file_name = temp_file_name.split(".")[0] + ".csv" - csv_reader = self.decrypt_and_read_csv(response, password) + response = self.trigger_export_api(payload_params) self.check_return_status() - else: - decoded_resp = response.data.decode(encoding='utf-8') - self.log("Decoded response of Export Device Credential file: {0}".format(str(decoded_resp)), "DEBUG") - # Parse the CSV-like string into a list of dictionaries - csv_reader = csv.DictReader(StringIO(decoded_resp)) - current_date = datetime.now() - formatted_date = current_date.strftime("%m-%d-%Y") - output_file_name = "devices-" + str(formatted_date) + ".csv" - - device_data = [] - for row in csv_reader: - device_data.append(row) + if payload_params["operationEnum"] == "0": + temp_file_name = response.filename + if first_run: + output_file_name = temp_file_name.split(".")[0] + ".csv" + csv_reader = self.decrypt_and_read_csv(response, password) + self.check_return_status() + else: + decoded_resp = response.data.decode(encoding='utf-8') + self.log("Decoded response of Export Device Credential file: {0}".format(str(decoded_resp)), "DEBUG") + # Parse the CSV-like string into a list of dictionaries + csv_reader = csv.DictReader(StringIO(decoded_resp)) + current_date = datetime.now() + formatted_date = current_date.strftime("%m-%d-%Y") + if first_run: + output_file_name = "devices-" + str(formatted_date) + ".csv" + + for row in csv_reader: + device_data.append(row) + start += chunk_size + first_run = False # Write the data to a CSV file with open(output_file_name, 'w', newline='') as csv_file: @@ -2474,7 +2484,9 @@ def check_credential_update(self): device_ips = self.get_device_ips_from_config_priority() device_uuids = self.get_device_ids(device_ips) password = "Testing@123" - payload_params = {"deviceUuids": device_uuids, "password": password, "operationEnum": "0"} + # Split the payload into 500 devices only to match the device credentials + device_ids_list = device_uuids[0:500] + payload_params = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} response = self.trigger_export_api(payload_params) self.check_return_status() csv_reader = self.decrypt_and_read_csv(response, password) @@ -3199,10 +3211,21 @@ def get_diff_merged(self, config): csv_reader = self.decrypt_and_read_csv(export_response, password) self.check_return_status() device_details = {} + start = 0 + chunk_size = 500 + + while start < len(device_uuids): + device_ids_list = device_uuids[start:start + chunk_size] + export_payload = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} + export_response = self.trigger_export_api(export_payload) + self.check_return_status() + csv_reader = self.decrypt_and_read_csv(export_response, password) + self.check_return_status() - for row in csv_reader: - ip_address = row['ip_address'] - device_details[ip_address] = row + for row in csv_reader: + ip_address = row['ip_address'] + device_details[ip_address] = row + start += chunk_size for device_ip in device_to_update: playbook_params = self.want.get("device_params").copy() diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 7c89bcf319..176a68500f 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -1194,34 +1194,45 @@ def export_device_details(self): self.result['response'] = self.msg return self - payload_params = { - "deviceUuids": device_uuids, - "password": password, - "operationEnum": export_device_list.get("operation_enum", "0"), - "parameters": export_device_list.get("parameters") - } - - response = self.trigger_export_api(payload_params) - self.check_return_status() + # Export the device data in a batch of 500 devices at a time + start = 0 + chunk_size = 500 + device_data = [] + first_run = True + + while start < len(device_uuids): + device_ids_list = device_uuids[start:start + chunk_size] + payload_params = { + "deviceUuids": device_ids_list, + "password": password, + "operationEnum": export_device_list.get("operation_enum", "0"), + "parameters": export_device_list.get("parameters") + } - if payload_params["operationEnum"] == "0": - temp_file_name = response.filename - output_file_name = temp_file_name.split(".")[0] + ".csv" - csv_reader = self.decrypt_and_read_csv(response, password) + response = self.trigger_export_api(payload_params) self.check_return_status() - else: - decoded_resp = response.data.decode(encoding='utf-8') - self.log("Decoded response of Export Device Credential file: {0}".format(str(decoded_resp)), "DEBUG") - # Parse the CSV-like string into a list of dictionaries - csv_reader = csv.DictReader(StringIO(decoded_resp)) - current_date = datetime.now() - formatted_date = current_date.strftime("%m-%d-%Y") - output_file_name = "devices-" + str(formatted_date) + ".csv" + if payload_params["operationEnum"] == "0": + temp_file_name = response.filename + if first_run: + output_file_name = temp_file_name.split(".")[0] + ".csv" + csv_reader = self.decrypt_and_read_csv(response, password) + self.check_return_status() + else: + decoded_resp = response.data.decode(encoding='utf-8') + self.log("Decoded response of Export Device Credential file: {0}".format(str(decoded_resp)), "DEBUG") - device_data = [] - for row in csv_reader: - device_data.append(row) + # Parse the CSV-like string into a list of dictionaries + csv_reader = csv.DictReader(StringIO(decoded_resp)) + current_date = datetime.now() + formatted_date = current_date.strftime("%m-%d-%Y") + if first_run: + output_file_name = "devices-" + str(formatted_date) + ".csv" + + for row in csv_reader: + device_data.append(row) + start += chunk_size + first_run = False # Write the data to a CSV file with open(output_file_name, 'w', newline='') as csv_file: @@ -2466,7 +2477,9 @@ def check_credential_update(self): device_ips = self.get_device_ips_from_config_priority() device_uuids = self.get_device_ids(device_ips) password = "Testing@123" - payload_params = {"deviceUuids": device_uuids, "password": password, "operationEnum": "0"} + # Split the payload into 500 devices only to match the device credentials + device_ids_list = device_uuids[0:500] + payload_params = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} response = self.trigger_export_api(payload_params) self.check_return_status() csv_reader = self.decrypt_and_read_csv(response, password) @@ -3184,16 +3197,22 @@ def get_diff_merged(self, config): # Update Device details and credentails device_uuids = self.get_device_ids(device_to_update) password = "Testing@123" - export_payload = {"deviceUuids": device_uuids, "password": password, "operationEnum": "0"} - export_response = self.trigger_export_api(export_payload) - self.check_return_status() - csv_reader = self.decrypt_and_read_csv(export_response, password) - self.check_return_status() + start = 0 + chunk_size = 500 device_details = {} - for row in csv_reader: - ip_address = row['ip_address'] - device_details[ip_address] = row + while start < len(device_uuids): + device_ids_list = device_uuids[start:start + chunk_size] + export_payload = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} + export_response = self.trigger_export_api(export_payload) + self.check_return_status() + csv_reader = self.decrypt_and_read_csv(export_response, password) + self.check_return_status() + + for row in csv_reader: + ip_address = row['ip_address'] + device_details[ip_address] = row + start += chunk_size for device_ip in device_to_update: playbook_params = self.want.get("device_params").copy() From 69b33c902bdc9231ee66619837c6c4db01569a42 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 26 Jul 2024 14:57:33 +0530 Subject: [PATCH 097/119] take export_device_details_limit parameter from the playbook and given the default value as 500. --- plugins/modules/inventory_intent.py | 24 +++++++++++------ plugins/modules/inventory_workflow_manager.py | 26 ++++++++++++------- 2 files changed, 33 insertions(+), 17 deletions(-) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index be10012439..d72c4be6fc 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -189,6 +189,13 @@ description: Make this as true needed for the Rebooting of Access Points. type: bool default: False + export_device_details_limit: + description: Specifies the limit for updating device details or exporting device details/credentials to a file. + The default limit is set to 500 devices. This limit is applied when exporting device details/credentials + and editing device details. + The maximum number of device details/credentials that can be exported in a single API call is 800. + type: int + default: 500 credential_update: description: Set this to 'True' to update device credentials and other device details. When this parameter is 'True', ensure that the devices are present in Cisco Catalyst Center; only then can update operations be performed on the respective devices. @@ -1197,12 +1204,12 @@ def export_device_details(self): # Export the device data in a batch of 500 devices at a time start = 0 - chunk_size = 500 + device_batch_size = self.config[0].get("export_device_details_limit", 500) device_data = [] first_run = True while start < len(device_uuids): - device_ids_list = device_uuids[start:start + chunk_size] + device_ids_list = device_uuids[start:start + device_batch_size] payload_params = { "deviceUuids": device_ids_list, "password": password, @@ -1231,7 +1238,7 @@ def export_device_details(self): for row in csv_reader: device_data.append(row) - start += chunk_size + start += device_batch_size first_run = False # Write the data to a CSV file @@ -2484,8 +2491,9 @@ def check_credential_update(self): device_ips = self.get_device_ips_from_config_priority() device_uuids = self.get_device_ids(device_ips) password = "Testing@123" - # Split the payload into 500 devices only to match the device credentials - device_ids_list = device_uuids[0:500] + # Split the payload into 500 devices(by default) only to match the device credentials + device_batch_size = self.config[0].get("export_device_details_limit", 500) + device_ids_list = device_uuids[0:device_batch_size] payload_params = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} response = self.trigger_export_api(payload_params) self.check_return_status() @@ -3212,10 +3220,10 @@ def get_diff_merged(self, config): self.check_return_status() device_details = {} start = 0 - chunk_size = 500 + device_batch_size = self.config[0].get("export_device_details_limit", 500) while start < len(device_uuids): - device_ids_list = device_uuids[start:start + chunk_size] + device_ids_list = device_uuids[start:start + device_batch_size] export_payload = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} export_response = self.trigger_export_api(export_payload) self.check_return_status() @@ -3225,7 +3233,7 @@ def get_diff_merged(self, config): for row in csv_reader: ip_address = row['ip_address'] device_details[ip_address] = row - start += chunk_size + start += device_batch_size for device_ip in device_to_update: playbook_params = self.want.get("device_params").copy() diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 176a68500f..967b8bdb94 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -189,6 +189,13 @@ description: Make this as true needed for the Rebooting of Access Points. type: bool default: False + export_device_details_limit: + description: Specifies the limit for updating device details or exporting device details/credentials to a file. + The default limit is set to 500 devices. This limit is applied when exporting device details/credentials + and editing device details. + The maximum number of device details/credentials that can be exported in a single API call is 800. + type: int + default: 500 credential_update: description: Set this to 'True' to update device credentials and other device details. When this parameter is 'True', ensure that the devices are present in Cisco Catalyst Center; only then can update operations be performed on the respective devices. @@ -1194,14 +1201,14 @@ def export_device_details(self): self.result['response'] = self.msg return self - # Export the device data in a batch of 500 devices at a time + # Export the device data in a batch of 500 devices at a time by default start = 0 - chunk_size = 500 + device_batch_size = self.config[0].get("export_device_details_limit", 500) device_data = [] first_run = True while start < len(device_uuids): - device_ids_list = device_uuids[start:start + chunk_size] + device_ids_list = device_uuids[start:start + device_batch_size] payload_params = { "deviceUuids": device_ids_list, "password": password, @@ -1231,7 +1238,7 @@ def export_device_details(self): for row in csv_reader: device_data.append(row) - start += chunk_size + start += device_batch_size first_run = False # Write the data to a CSV file @@ -2477,8 +2484,9 @@ def check_credential_update(self): device_ips = self.get_device_ips_from_config_priority() device_uuids = self.get_device_ids(device_ips) password = "Testing@123" - # Split the payload into 500 devices only to match the device credentials - device_ids_list = device_uuids[0:500] + # Split the payload into 500 devices(by default) only to match the device credentials + device_batch_size = self.config[0].get("export_device_details_limit", 500) + device_ids_list = device_uuids[0:device_batch_size] payload_params = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} response = self.trigger_export_api(payload_params) self.check_return_status() @@ -3198,11 +3206,11 @@ def get_diff_merged(self, config): device_uuids = self.get_device_ids(device_to_update) password = "Testing@123" start = 0 - chunk_size = 500 + device_batch_size = self.config[0].get("export_device_details_limit", 500) device_details = {} while start < len(device_uuids): - device_ids_list = device_uuids[start:start + chunk_size] + device_ids_list = device_uuids[start:start + device_batch_size] export_payload = {"deviceUuids": device_ids_list, "password": password, "operationEnum": "0"} export_response = self.trigger_export_api(export_payload) self.check_return_status() @@ -3212,7 +3220,7 @@ def get_diff_merged(self, config): for row in csv_reader: ip_address = row['ip_address'] device_details[ip_address] = row - start += chunk_size + start += device_batch_size for device_ip in device_to_update: playbook_params = self.want.get("device_params").copy() From 315afe4c409a6448a1c4e098d8050f2f037447c9 Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Fri, 26 Jul 2024 15:03:40 +0530 Subject: [PATCH 098/119] update the default value in the validate_input API as well --- plugins/modules/inventory_intent.py | 1 + plugins/modules/inventory_workflow_manager.py | 1 + 2 files changed, 2 insertions(+) diff --git a/plugins/modules/inventory_intent.py b/plugins/modules/inventory_intent.py index d72c4be6fc..5e61c2f5a4 100644 --- a/plugins/modules/inventory_intent.py +++ b/plugins/modules/inventory_intent.py @@ -782,6 +782,7 @@ def validate_input(self): 'device_resync': {'type': 'bool'}, 'reboot_device': {'type': 'bool'}, 'credential_update': {'type': 'bool'}, + 'export_device_details_limit': {'default': 500, 'type': 'bool'}, 'force_sync': {'type': 'bool'}, 'clean_config': {'type': 'bool'}, 'add_user_defined_field': { diff --git a/plugins/modules/inventory_workflow_manager.py b/plugins/modules/inventory_workflow_manager.py index 967b8bdb94..368ed18b78 100644 --- a/plugins/modules/inventory_workflow_manager.py +++ b/plugins/modules/inventory_workflow_manager.py @@ -781,6 +781,7 @@ def validate_input(self): 'device_resync': {'type': 'bool'}, 'reboot_device': {'type': 'bool'}, 'credential_update': {'type': 'bool'}, + 'export_device_details_limit': {'default': 500, 'type': 'bool'}, 'force_sync': {'type': 'bool'}, 'clean_config': {'type': 'bool'}, 'add_user_defined_field': { From 2b92a61dbdc9e1d65851748c870ba0fc4964daa0 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Fri, 26 Jul 2024 17:53:01 +0530 Subject: [PATCH 099/119] Updated code based on review comments. --- playbooks/dnac.log | 74850 ++++++++++++++++ playbooks/user_role_workflow_manager.yml | 7 +- plugins/modules/user_role_workflow_manager.py | 1296 +- .../fixtures/user_role_workflow_manager.json | 6 +- .../dnac/test_user_role_workflow_manager.py | 2 +- 5 files changed, 75488 insertions(+), 673 deletions(-) create mode 100644 playbooks/dnac.log diff --git a/playbooks/dnac.log b/playbooks/dnac.log new file mode 100644 index 0000000000..110159ef4d --- /dev/null +++ b/playbooks/dnac.log @@ -0,0 +1,74850 @@ +07-26-2024 11:10:27 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:10:27 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:10:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:10:27 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:10:27 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:27 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 11:10:27 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:10:27 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:10:27 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:27 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:10:27 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: create + +07-26-2024 11:10:27 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:27 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:10:27 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:10:27 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:28 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:28 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:10:28 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:10:28 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:28 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 11:10:28 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 11:10:28 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 11:10:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 11:10:28 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:10:29 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:29 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:10:29 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:10:29 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:29 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:10:29 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:10:54 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:10:54 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:10:54 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:10:54 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:54 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:10:55 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:10:55 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:10:55 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:10:55 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:55 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 11:10:55 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:10:55 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:10:55 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:10:55 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:10:55 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] + +07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:11:23 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:11:23 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:11:23 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:11:23 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:11:23 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:11:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:11:23 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:11:23 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:23 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:11:23 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:11:23 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:24 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:24 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:11:24 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:11:24 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:24 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:11:24 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:11:24 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:11:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:11:24 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:11:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:11:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:11:25 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:25 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:11:25 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:11:44 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:11:44 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:11:44 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:11:44 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:11:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:11:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:11:44 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:11:44 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:44 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:11:44 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:11:44 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:11:45 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 11:11:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 11:11:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:11:45 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:11:45 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:11:45 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:11:45 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:11:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:12:01 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:12:01 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:12:01 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:12:01 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:01 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:01 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:01 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:01 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:12:02 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:02 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:12:02 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:12:02 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:02 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:12:02 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:12:02 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:02 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:02 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:12:02 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:12:02 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:12:03 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:12:03 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:12:03 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:12:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:12:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:12:03 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:12:03 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:12:03 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:12:03 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:12:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:03 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:13:03 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:13:03 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:13:03 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:03 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:03 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:03 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:13:03 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:13:03 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:03 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:03 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:03 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:04 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:04 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:13:04 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:04 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:04 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:04 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:04 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:05 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:05 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:13:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:09 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:13:09 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:13:09 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:13:09 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:09 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:09 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:10 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:10 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:13:10 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:13:10 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:10 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:10 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:13:10 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:11 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:11 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:11 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:11 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:13:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:33 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:13:33 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:13:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:13:33 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:33 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:34 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:34 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:34 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:34 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:13:34 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:13:34 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:34 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:34 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': []} + +07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings + +07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:34 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:34 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:13:34 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:35 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:35 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:13:35 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:13:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:35 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:35 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:35 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:35 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:35 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:35 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:53 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:13:53 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:13:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:13:53 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:13:53 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:13:53 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:53 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:53 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': []} + +07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:13:54 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 11:13:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 11:13:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:13:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:13:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:13:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:13:54 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] + +07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:13:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:05 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:14:05 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:14:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:14:05 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:05 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:06 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:14:06 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:14:06 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:06 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:06 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:14:06 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}]} + +07-26-2024 11:14:07 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:07 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:07 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:07 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:07 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:07 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:07 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:14:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:14:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:14:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:14:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:20 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:14:20 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:14:20 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:20 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:20 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:14:20 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}]} + +07-26-2024 11:14:21 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:21 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:21 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:21 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True + +07-26-2024 11:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:43 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:14:43 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:14:43 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:14:43 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:43 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:44 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:14:44 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:14:44 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:44 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:44 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:44 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:44 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:14:44 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:14:45 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:45 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:14:45 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:14:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:14:45 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:14:45 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:14:45 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:14:45 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... + +07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance + +07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools + +07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities + +07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:14:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. + +07-26-2024 11:14:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False + +07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:14:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:47:37 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:47:37 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:47:37 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:47:37 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:37 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:37 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:47:38 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:38 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 11:47:38 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 11:47:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:38 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:47:38 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:47:38 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:38 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:38 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1518: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' + +07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: create + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2636: Permission denied at level: monitoring_and_troubleshooting + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2636: Permission denied at level: monitoring_settings + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2735: Permission check complete. Any denied operations: True + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:38 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:47:38 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False + +07-26-2024 11:47:38 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:39 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 11:47:39 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 11:47:39 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 11:47:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 11:47:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:47:39 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:39 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:47:39 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:47:39 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' + +07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:39 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:47:39 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False + +07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2900: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:47:55 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:47:55 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:47:55 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:47:55 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:55 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:55 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:47:56 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:47:56 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:47:56 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:47:56 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:56 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False + +07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 11:47:56 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:47:56 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:47:56 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:47:56 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:47:56 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] + +07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False + +07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2900: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:48:15 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 11:48:15 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 11:48:15 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 11:48:15 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:15 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:48:16 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:16 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:48:16 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:48:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 11:48:16 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 11:48:16 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:16 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 11:48:16 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2575: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: True + +07-26-2024 11:48:16 DEBUG UserandRole: update_role: 2466: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:48:17 DEBUG UserandRole: update_role: 2473: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:48:17 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 11:48:17 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:48:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 11:48:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 11:48:17 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 11:48:17 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 11:48:17 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 11:48:17 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... + +07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: system + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: system + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools + +07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools + +07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities + +07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. + +07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2575: Removing resource due to denied type: troubleshooting tools + +07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: True + +07-26-2024 11:48:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 12:12:38 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 12:12:38 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 12:12:38 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 12:12:38 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:38 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:38 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 12:12:39 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:12:39 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 12:12:39 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 12:12:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:39 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 12:12:39 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 12:12:39 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:39 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:12:39 WARNING UserandRole: generate_role_payload: 2223: Starting payload generation for role... + +07-26-2024 12:56:30 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 12:56:30 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 12:56:30 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 12:56:30 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:30 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:30 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 12:56:31 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:56:31 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 12:56:31 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 12:56:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:31 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 12:56:31 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 12:56:31 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:31 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:56:31 WARNING UserandRole: generate_role_payload: 2223: Starting payload generation for role... + +07-26-2024 12:56:31 WARNING UserandRole: generate_role_payload: 2248: Processing rules using process_assurance_rules... + +07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 12:58:12 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 12:58:12 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 12:58:12 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 12:58:12 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:12 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 12:58:42 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 12:58:42 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 12:58:42 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 12:58:42 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 12:58:42 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:42 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 12:58:42 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 12:58:42 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 12:58:42 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:42 WARNING UserandRole: generate_role_payload: 2224: Starting payload generation for role... + +07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1518: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 12:58:42 DEBUG UserandRole: get_permissions: 2703: Starting permission retrieval for role operation: create + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: troubleshooting_tools + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2645: Final permission check: Denied: False, Allowed: True + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: troubleshooting_tools + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_analytics + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: data_access + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_analytics + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: advanced_network_settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_repository + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_hierarchy + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_profiles + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: virtual_network + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: compliance + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: eox + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_update + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: license + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.License + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_telemetry + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: pnp + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: provision + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: app_hosting + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: bonjour + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: stealthwatch + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: umbrella + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: group-based_policy + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: ip_based_access_control + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: security_advisories + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: system + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: machine_reasoning + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: system + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: system + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: system_management + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.System Management + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: system + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: scheduler + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: event_viewer + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_reasoner + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: search + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Search + +07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: get_permissions: 2734: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 12:58:43 DEBUG UserandRole: get_permissions: 2740: Permission check complete. Any denied operations: False + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: role_name + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: role_name + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: description + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: description + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2514: Processing list with parent_key: assurance + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: assurance[0] + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].overall + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].overall + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2518: Found 'deny' at index: assurance[0] + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_analytics + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_analytics + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_design + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_design + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_provision + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_services + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: platform + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: platform + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: security + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: security + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: system + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: system + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: utilities + +07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2539: Starting removal of denied operations. + +07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2577: Removing resource due to denied type: troubleshooting tools + +07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2585: Removal complete. Update required: True + +07-26-2024 12:58:43 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 12:58:43 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 12:58:43 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 12:58:43 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 12:58:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 12:58:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 12:58:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 12:58:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 12:58:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2884: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2885: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2894: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 12:58:44 WARNING UserandRole: generate_role_payload: 2224: Starting payload generation for role... + +07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. + +07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2703: Starting permission retrieval for role operation: update + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_analytics + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: data_access + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_analytics + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: advanced_network_settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_repository + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_hierarchy + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_profiles + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: virtual_network + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: compliance + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: eox + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_update + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: license + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.License + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_telemetry + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: pnp + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: provision + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: app_hosting + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: bonjour + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: stealthwatch + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: umbrella + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: group-based_policy + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: ip_based_access_control + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: security_advisories + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: system + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: machine_reasoning + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: system + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: system + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: system_management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.System Management + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: system + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: scheduler + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: event_viewer + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_reasoner + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: search + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Search + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: troubleshooting_tools + +07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2645: Final permission check: Denied: False, Allowed: True + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: troubleshooting_tools + +07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2734: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2740: Permission check complete. Any denied operations: False + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: role_name + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: role_name + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: description + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: description + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2514: Processing list with parent_key: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: assurance[0] + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].overall + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].overall + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2518: Found 'deny' at index: assurance[0] + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_analytics + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_analytics + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_design + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_provision + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_services + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: platform + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: platform + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: security + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: security + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: system + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: system + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: utilities + +07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2539: Starting removal of denied operations. + +07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2577: Removing resource due to denied type: troubleshooting tools + +07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2585: Removal complete. Update required: True + +07-26-2024 12:58:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:19:40 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:19:40 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:19:40 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:19:40 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:40 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:40 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:19:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:19:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:19:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:19:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:41 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:19:41 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:19:41 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:19:41 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] + +07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_Access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:19:41 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: data_access + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type + +07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations + +07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations + +07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_Access + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_Access + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:19:41 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:20:11 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:20:11 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:20:11 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:20:11 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:20:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:20:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:20:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:20:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:11 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] + +07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:20:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:20:11 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type + +07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations + +07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations + +07-26-2024 13:20:12 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:20:12 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:20:12 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:20:51 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:20:51 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:20:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:20:51 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:20:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:20:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:20:51 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:20:51 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:51 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] + +07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:20:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:20:51 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 13:20:52 DEBUG UserandRole: update_role: 2479: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:20:52 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:20:52 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:20:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:20:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:20:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:20:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:20:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2888: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2889: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2898: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:20:53 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] + +07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:20:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:21:11 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:21:11 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:21:11 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:21:11 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:21:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:21:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:21:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:21:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:11 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:21:11 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:21:12 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:21:12 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:21:12 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 13:21:12 DEBUG UserandRole: update_role: 2479: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:21:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:21:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:21:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:21:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:21:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:21:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:21:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2888: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2889: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2898: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:21:13 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:21:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:21:59 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:21:59 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:21:59 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:21:59 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:59 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:59 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:59 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:21:59 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:22:00 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:22:00 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:22:00 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:22:00 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:22:00 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:22:00 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:22:00 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:22:00 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:22:00 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:22:00 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: data_access + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: system + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: system + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type + +07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations + +07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations + +07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities + +07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. + +07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True + +07-26-2024 13:22:00 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:25:33 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:25:33 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:25:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:25:33 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:25:33 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:25:33 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:25:33 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:25:33 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:25:33 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:25:33 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... + +07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:25:33 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:25:33 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:27:48 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:27:48 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:27:48 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:27:48 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:48 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:27:49 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:49 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:27:49 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:27:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:49 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:27:49 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:27:49 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:49 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... + +07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:27:49 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:27:49 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:27:49 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools + +07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools + +07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities + +07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. + +07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2582: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: True + +07-26-2024 13:27:49 DEBUG UserandRole: update_role: 2473: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} + +07-26-2024 13:27:50 DEBUG UserandRole: update_role: 2480: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:27:50 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:27:50 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:27:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:27:50 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:27:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:27:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2889: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2890: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2899: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:27:50 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... + +07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' + +07-26-2024 13:27:50 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:27:50 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools + +07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools + +07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities + +07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] + +07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. + +07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2582: Removing resource due to denied type: troubleshooting tools + +07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: True + +07-26-2024 13:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:28:16 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:28:16 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:28:16 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:28:16 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:16 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:28:17 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:28:17 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:28:17 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:28:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:17 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:28:17 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:28:17 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:28:17 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... + +07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1548: Converted permission read to operations ['gRead'] + +07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1570: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. + +07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1614: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:28:17 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: system + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: system + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: type + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: type + +07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: operations + +07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: operations + +07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: network_analytics + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics[0].overall + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities + +07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] + +07-26-2024 13:28:17 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. + +07-26-2024 13:28:17 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: False + +07-26-2024 13:28:17 DEBUG UserandRole: update_role: 2473: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:37:47 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:37:47 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:37:47 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:37:47 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:37:47 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:47 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:37:47 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:37:47 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:37:47 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:47 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:37:47 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:37:47 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:37:48 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:37:48 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:37:48 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:48 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:37:48 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:37:48 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:37:48 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:37:48 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:37:48 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:37:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:37:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:37:49 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:37:49 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:37:49 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:37:49 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:37:49 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:37:49 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:37:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:39:40 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:39:40 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:39:40 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:39:40 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:39:40 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:39:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:39:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:39:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:40 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:39:40 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:39:40 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:39:41 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 13:39:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 13:39:41 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:39:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:39:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:39:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:39:41 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:39:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:40:46 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:40:46 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:40:46 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:40:46 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:46 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:46 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:46 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:46 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:40:47 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:47 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:40:47 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:47 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:40:47 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:40:47 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:47 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:40:47 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:47 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:40:47 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:40:47 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:48 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:40:48 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:40:48 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:40:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:40:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:40:48 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:48 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:40:48 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:40:48 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access + +07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:48 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:40:48 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:40:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:40:52 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:40:52 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:40:52 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:40:52 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:52 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:40:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:40:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:40:53 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:40:53 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:53 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:40:53 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access + +07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:53 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:40:53 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:40:53 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:54 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:40:54 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:40:54 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:40:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:40:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:40:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:40:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:40:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:40:54 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access + +07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:40:54 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:40:54 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:40:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:41:35 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:41:35 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:41:35 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:41:35 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:35 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:41:36 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:36 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:41:36 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:41:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:36 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:41:36 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:41:36 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:36 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:41:36 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:36 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:41:36 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:41:36 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:41:37 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:41:37 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:41:37 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:41:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:41:37 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:41:37 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:41:37 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:41:37 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:41:37 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] + +07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} + +07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 13:41:37 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:41:37 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False + +07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} + +07-26-2024 13:41:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:42:10 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:42:10 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:42:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:42:10 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:10 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:42:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:42:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:42:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:42:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:11 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 13:42:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access + +07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True + +07-26-2024 13:42:11 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:42:12 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:42:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:42:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:42:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:42:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:42:12 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:12 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:42:12 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:42:12 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access + +07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True + +07-26-2024 13:42:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:42:25 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 13:42:25 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 13:42:25 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 13:42:25 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:42:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:42:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 13:42:25 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 13:42:25 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:25 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 13:42:25 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:25 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:42:26 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:26 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access + +07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True + +07-26-2024 13:42:26 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} + +07-26-2024 13:42:26 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:42:27 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 13:42:27 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:42:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 13:42:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 13:42:27 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 13:42:27 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 13:42:27 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} + +07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 13:42:27 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... + +07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: system + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: system + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access + +07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics + +07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access + +07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities + +07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. + +07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access + +07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True + +07-26-2024 13:42:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:25:22 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 14:25:22 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 14:25:22 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:25:22 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:22 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:22 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:25:23 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 14:25:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 14:25:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:23 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:25:23 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 14:25:23 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:23 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:23 WARNING UserandRole: generate_role_payload: 2168: Starting payload generation for role... + +07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2647: Starting permission retrieval for role operation: create + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_settings + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: troubleshooting_tools + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: troubleshooting_tools + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_analytics + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: data_access + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_analytics + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: data_access + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: advanced_network_settings + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_repository + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_repository + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_hierarchy + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_profiles + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_settings + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: virtual_network + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: compliance + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: eox + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: eox + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_update + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_update + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: device_configuration + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: discovery + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_device + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: port_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: port_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: topology + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: license + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_telemetry + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: pnp + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: app_hosting + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: bonjour + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: bonjour + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: stealthwatch + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: umbrella + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: platform + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: bundles + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: platform + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: bundles + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: group-based_policy + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: ip_based_access_control + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: ip_based_access_control + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security_advisories + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security_advisories + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: machine_reasoning + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: machine_reasoning + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.System Management + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system_management + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: event_viewer + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_reasoner + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: search + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: scheduler + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: audit_log + +07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: audit_log + +07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2678: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2681: Permission check complete. Any denied operations: True + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: role_name + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: role_name + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: description + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: description + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: assurance[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_analytics + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].data_access + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].image_repository + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_design[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].eox + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].image_update + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].bonjour + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_services[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: platform + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].bundles + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: platform[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: security + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: security[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].ip_based_access_control + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].security_advisories + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: security[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: system + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: system[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].machine_reasoning + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].system_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].system_management + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: system[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].audit_log + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: utilities[0] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities + +07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2483: Starting removal of denied operations. + +07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: data access + +07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: security advisories + +07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: system management + +07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2529: Removal complete. Update required: True + +07-26-2024 14:25:23 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:25:24 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:25:24 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:25:24 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:25:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:25:24 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:25:24 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:25:24 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:25:24 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2828: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2829: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2838: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:25:24 WARNING UserandRole: generate_role_payload: 2168: Starting payload generation for role... + +07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2647: Starting permission retrieval for role operation: update + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_settings + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: troubleshooting_tools + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: troubleshooting_tools + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_repository + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_design + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_repository + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: compliance + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: eox + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: eox + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_update + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_update + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: device_configuration + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: discovery + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_device + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: port_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: port_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: topology + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: license + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_telemetry + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: pnp + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: bonjour + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_services + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: bonjour + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: platform + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: bundles + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: platform + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: bundles + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: security + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: ip_based_access_control + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: security + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: ip_based_access_control + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: system + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: machine_reasoning + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: system + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: machine_reasoning + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: audit_log + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: utilities + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: audit_log + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_analytics + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: data_access + +07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_analytics + +07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: data_access + +07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2678: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2684: Permission check complete. Any denied operations: False + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: role_name + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: role_name + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: description + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: description + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: assurance[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_analytics + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].data_access + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_design + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].image_repository + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_design[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].eox + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].image_update + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_services + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].bonjour + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_services[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: platform + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].bundles + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: platform[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: security + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: security[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].ip_based_access_control + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].security_advisories + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: security[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: system + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: system[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].machine_reasoning + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].system_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].system_management + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: system[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: utilities + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].audit_log + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: utilities[0] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities + +07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2483: Starting removal of denied operations. + +07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: data access + +07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2529: Removal complete. Update required: True + +07-26-2024 14:25:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:40:39 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 14:40:39 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 14:40:39 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:40:39 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:39 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:40:40 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 14:40:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 14:40:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:40:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 14:40:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:40 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:40 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... + +07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: create + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_analytics + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: data_access + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_analytics + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: data_access + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: advanced_network_settings + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_hierarchy + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_profiles + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_settings + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: virtual_network + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: app_hosting + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: stealthwatch + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: umbrella + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: group-based_policy + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security_advisories + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security_advisories + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.System Management + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system_management + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: event_viewer + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_reasoner + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: search + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: scheduler + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log + +07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log + +07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: True + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].data_access + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities + +07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. + +07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: data access + +07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: security advisories + +07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: system management + +07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: True + +07-26-2024 14:40:40 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:40:41 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:40:41 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:40:41 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:40:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:40:41 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:40:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:40:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:40:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2891: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2892: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2901: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:40:41 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... + +07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: security + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: system + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: system + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_analytics + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: data_access + +07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_analytics + +07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: data_access + +07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].data_access + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall + +07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities + +07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. + +07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: data access + +07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: True + +07-26-2024 14:40:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:43:03 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 14:43:03 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 14:43:03 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:43:03 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:03 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:43:04 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:04 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:43:04 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:43:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:04 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:43:04 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 14:43:04 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:04 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... + +07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:43:04 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: security + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: system + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: system + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log + +07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities + +07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log + +07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities + +07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:43:04 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. + +07-26-2024 14:43:04 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: False + +07-26-2024 14:43:04 DEBUG UserandRole: update_role: 2475: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:43:05 DEBUG UserandRole: update_role: 2482: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 14:43:05 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 14:43:05 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 14:43:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:43:05 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:43:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2891: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2892: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2901: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:43:05 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... + +07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: security + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: security + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: system + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: system + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log + +07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities + +07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log + +07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities + +07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:43:05 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. + +07-26-2024 14:43:05 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: False + +07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2909: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:43:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:43:05 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:05 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:43:06 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985052', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985052', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 14:43:06 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:43:06 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 14:43:06 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:43:06 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 14:43:06 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:06 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:43:06 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config + +07-26-2024 14:43:06 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 14:49:23 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 14:49:23 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 14:49:23 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:49:23 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:23 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:24 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:24 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 14:49:24 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 14:49:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:24 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:49:24 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 14:49:24 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:24 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: create + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_analytics + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: data_access + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: advanced_network_settings + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_hierarchy + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_profiles + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_settings + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: virtual_network + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: app_hosting + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: stealthwatch + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: umbrella + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: group-based_policy + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.System Management + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system_management + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: event_viewer + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_reasoner + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: search + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: scheduler + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log + +07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log + +07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2665: Permission check complete. Any denied operations: True + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].system_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].system_management + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities + +07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. + +07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2505: Removing resource due to denied type: security advisories + +07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2505: Removing resource due to denied type: system management + +07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: True + +07-26-2024 14:49:24 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:25 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:49:25 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 14:49:25 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:49:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 14:49:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:49:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2812: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2813: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2822: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: system + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: system + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log + +07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities + +07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log + +07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].system_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].system_management + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities + +07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] + +07-26-2024 14:49:26 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. + +07-26-2024 14:49:26 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False + +07-26-2024 14:49:26 INFO UserandRole: verify_diff_merged: 2830: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:49:26 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:49:26 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:26 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985544', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985544', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 14:49:26 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:26 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 14:49:26 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:49:26 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 14:49:26 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:26 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config + +07-26-2024 14:49:26 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 14:49:51 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 14:49:51 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 14:49:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:49:51 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:51 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:52 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:49:52 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:49:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:49:52 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 14:49:52 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:52 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: system + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: system + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories + +07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories + +07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities + +07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 14:49:52 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. + +07-26-2024 14:49:52 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False + +07-26-2024 14:49:52 DEBUG UserandRole: update_role: 2396: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:49:53 DEBUG UserandRole: update_role: 2403: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 14:49:53 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 14:49:53 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 14:49:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 14:49:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2812: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2813: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2822: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: system + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: system + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories + +07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security + +07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories + +07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities + +07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 14:49:53 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. + +07-26-2024 14:49:53 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False + +07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2830: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 14:49:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 14:49:53 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:53 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 14:49:53 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985571', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985571', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 14:49:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 14:49:54 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 14:49:54 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:54 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 14:49:54 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 14:49:54 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:54 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 14:49:54 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config + +07-26-2024 14:49:54 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 15:50:10 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 15:50:10 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 15:50:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 15:50:10 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:10 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:50:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 15:50:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 15:50:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 15:50:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: create + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_analytics + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: data_access + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: advanced_network_settings + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_hierarchy + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_profiles + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_settings + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: virtual_network + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: app_hosting + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: stealthwatch + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: umbrella + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: group-based_policy + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: system_management + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: event_viewer + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_reasoner + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: search + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: scheduler + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2690: Permission check complete. Any denied operations: True + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 15:50:12 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 15:50:12 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 15:50:12 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:12 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 15:50:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} + +07-26-2024 15:50:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 15:50:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} + +07-26-2024 15:50:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:50:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 15:50:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 15:50:13 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 15:50:13 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:50:13 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 15:50:13 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:50:13 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985599', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985599', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 15:50:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:50:13 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 15:50:13 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 15:50:13 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 15:50:13 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} + +07-26-2024 15:50:13 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config + +07-26-2024 15:50:13 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 15:51:50 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 15:51:50 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 15:51:50 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 15:51:50 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:51:50 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 15:51:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 15:51:50 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 15:51:50 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:50 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 15:51:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 15:51:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:51:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 15:51:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 15:51:51 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:51 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:51:51 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989268', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 15:51:52 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:52 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 15:51:52 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 15:51:52 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 15:51:52 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:52 DEBUG UserandRole: create_user: 1413: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'roleList': ['SUPER-ADMIN']} + +07-26-2024 15:51:52 DEBUG UserandRole: create_user: 1420: Received API response from create_user: {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}} + +07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}} + +07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}}}} + +07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}}}} + +07-26-2024 15:51:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:51:52 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 15:51:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 15:51:53 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:53 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:53 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 15:51:53 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 15:51:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 15:51:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 15:51:53 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 15:51:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 15:51:53 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 15:51:53 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 15:51:53 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 15:51:53 DEBUG UserandRole: create_user: 1413: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': ['6486ce98ff1f0d0c8be622fb']} + +07-26-2024 15:51:53 ERROR UserandRole: get_diff_merged: 1327: Mandatory field not present: An error occurred while creating the user + +07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:10:17 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:10:17 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:10:17 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:10:17 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:17 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:10:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:10:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:10:18 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:10:18 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:10:18 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 16:10:18 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:10:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:10:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:10:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:10:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 16:10:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 16:10:19 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:10:19 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:10:19 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:10:19 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:19 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989398', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:19 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989398', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:10:19 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:10:19 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:19 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:19 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:19 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:10:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:10:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:10:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:10:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:20 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:10:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:10:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:10:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:10:21 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:10:21 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:10:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:10:21 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:10:21 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:10:21 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:10:21 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:14:18 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:14:18 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:14:18 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:14:18 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:14:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:14:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:14:18 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:14:18 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:18 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:18 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 16:14:18 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 16:14:18 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 16:14:19 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:14:19 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:19 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:14:19 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1971: Processing security rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2044: Processing system rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... + +07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. + +07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' + +07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] + +07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... + +07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities + +07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. + +07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False + +07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. + +07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:14:19 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:19 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:14:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990459', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990459', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:14:20 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:14:20 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:14:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:14:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} + +07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:20 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:14:21 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:14:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:14:21 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:14:21 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} + +07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:14:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:14:21 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:14:21 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:14:21 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:14:21 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:16:08 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:16:08 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:16:08 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:16:08 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:08 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:08 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:08 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:08 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:16:09 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:16:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:16:10 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:16:10 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2173: Starting payload generation for role... + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_assurance_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1527: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1529: Processing assurance rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1573: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_analytics_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1593: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1595: Processing network analytics rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1613: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_design_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1655: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1657: Processing network design rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1675: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1679: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1697: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_provision_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1727: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1729: Processing network provision rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1819: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1833: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1777: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_services_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1855: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1857: Processing network services rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1875: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1879: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1895: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_platform_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1905: Processing platform rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1923: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1927: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1950: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_security_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1971: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1973: Processing security rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1991: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2010: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2024: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_system_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2044: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2046: Processing system rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2064: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2068: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2082: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_utilities_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2109: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2111: Processing utilities rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2129: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2133: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2151: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2207: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2213: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2254: Starting role comparison for updates... + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2290: Calling get_permissions to filter permissions... + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2658: Starting permission retrieval for role operation: update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_settings + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: compliance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: eox + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: eox + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: device_configuration + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: discovery + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_device + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: port_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: port_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: topology + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: license + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_telemetry + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: pnp + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: platform + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bundles + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: platform + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bundles + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: system + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: system + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2689: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2695: Permission check complete. Any denied operations: False + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2293: Finding denied permissions... + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: role_name + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: role_name + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: description + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: description + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: assurance[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_design[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].eox + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].image_update + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_services[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].bundles + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: platform[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: security[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: security[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: system[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: system[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: utilities[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2494: Starting removal of denied operations. + +07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2540: Removal complete. Update required: False + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2301: No updates required for the role. + +07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:16:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:16:10 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:16:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2839: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2840: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2849: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2173: Starting payload generation for role... + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_assurance_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1527: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1529: Processing assurance rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1573: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_analytics_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1593: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1595: Processing network analytics rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1613: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_design_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1655: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1657: Processing network design rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1675: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1679: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1697: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_provision_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1727: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1729: Processing network provision rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1819: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1833: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1777: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_services_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1855: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1857: Processing network services rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1875: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1879: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1895: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_platform_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1905: Processing platform rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1923: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1927: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1950: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_security_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1971: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1973: Processing security rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1991: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2010: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2024: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_system_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2044: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2046: Processing system rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2064: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2068: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2082: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_utilities_rules... + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2109: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2111: Processing utilities rules. + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2129: Skipping resource overall because permission is 'deny' + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2133: Converted permission read to operations ['gRead'] + +07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2151: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2207: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2213: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2254: Starting role comparison for updates... + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2290: Calling get_permissions to filter permissions... + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2658: Starting permission retrieval for role operation: update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_settings + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: compliance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: eox + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: eox + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_update + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: device_configuration + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: discovery + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_device + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: port_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: port_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: topology + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: license + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_telemetry + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: pnp + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: platform + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bundles + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: platform + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bundles + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: system + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: system + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2689: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2695: Permission check complete. Any denied operations: False + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2293: Finding denied permissions... + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: role_name + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: role_name + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: description + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: description + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: assurance[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_design[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].eox + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].image_update + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_services[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].bundles + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: platform[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: security[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: security[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: system[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: system[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: utilities[0] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities + +07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2494: Starting removal of denied operations. + +07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2540: Removal complete. Update required: False + +07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2301: No updates required for the role. + +07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2857: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:16:10 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:10 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:16:11 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:16:11 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:11 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990661', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:11 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990661', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:16:11 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:16:11 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:11 WARNING UserandRole: user_requires_update: 2382: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:11 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:11 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:16:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:16:11 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:16:12 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:12 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2862: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2863: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2872: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:12 WARNING UserandRole: user_requires_update: 2382: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2879: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:12 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:16:12 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:16:12 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:16:12 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:16:12 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:16:12 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:16:12 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:16:12 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:16:12 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:16:12 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:22:13 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:22:13 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:22:13 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:22:13 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:13 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:13 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:22:14 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:22:14 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:22:14 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:22:14 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:22:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:22:14 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:14 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:22:14 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:14 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:22:14 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:14 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:22:15 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:22:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:15 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990772', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:15 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990772', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:15 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:22:15 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:22:15 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:15 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:15 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:15 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:22:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:22:15 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:22:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:16 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:16 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:16 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:22:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:22:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:22:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:22:16 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:22:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:22:16 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:22:16 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:22:16 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:22:16 DEBUG UserandRole: create_user: 1418: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': 'OBSERVER'} + +07-26-2024 16:22:17 ERROR UserandRole: get_diff_merged: 1328: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:22:17 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:24:25 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:24:25 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:24:25 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:24:25 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:25 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:26 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:24:26 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:24:26 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:24:26 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:24:26 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:24:26 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:24:26 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:26 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:26 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:24:26 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:24:27 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:24:27 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:24:27 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:24:27 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:27 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:24:27 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:27 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991136', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:27 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991136', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:24:27 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:24:27 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:27 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:27 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:27 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:24:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:28 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:24:28 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:28 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:28 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:28 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:28 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:28 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:24:28 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:28 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:24:28 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:28 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:24:28 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:24:28 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:24:28 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:24:28 DEBUG UserandRole: create_user: 1418: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': ['OBSERVER']} + +07-26-2024 16:24:29 DEBUG UserandRole: create_user: 1425: Received API response from create_user: {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}} + +07-26-2024 16:24:29 INFO UserandRole: get_diff_merged: 1318: Task respoonse {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}} + +07-26-2024 16:24:29 INFO UserandRole: get_diff_merged: 1324: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}}}} + +07-26-2024 16:24:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}}}} + +07-26-2024 16:24:29 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:24:29 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991269', 'roleList': ['OBSERVER']}]}} + +07-26-2024 16:24:29 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:24:29 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']} + +07-26-2024 16:24:29 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2875: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:24:29 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2882: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:24:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:14 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:25:14 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:25:14 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:25:14 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:14 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:25:15 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:25:15 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:25:15 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:25:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:15 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:25:15 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:15 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:25:15 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:15 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['OBSERVER']}]}} + +07-26-2024 16:25:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991306', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:16 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991306', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:25:16 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:25:16 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:16 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:16 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:16 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:25:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['OBSERVER']}]}} + +07-26-2024 16:25:17 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:17 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:17 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:17 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['OBSERVER']}]}} + +07-26-2024 16:25:17 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:17 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991317', 'role_list': ['OBSERVER']} + +07-26-2024 16:25:17 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991317', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:17 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:25:17 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:25:17 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2373: Updating role list with new role ID SUPER-ADMIN. + +07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:17 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:17 DEBUG UserandRole: update_user: 2401: Updating user with parameters: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'roleList': ['SUPER-ADMIN'], 'username': 'syedkhadeer', 'userId': '66a38065f335550043731da9'} + +07-26-2024 16:25:18 DEBUG UserandRole: update_user: 2408: Received API response from update_user: {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}} + +07-26-2024 16:25:18 INFO UserandRole: get_diff_merged: 1318: Task respoonse {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}} + +07-26-2024 16:25:18 INFO UserandRole: get_diff_merged: 1324: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}}}} + +07-26-2024 16:25:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}}}} + +07-26-2024 16:25:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:25:18 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991318', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:25:18 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:25:18 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:18 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} + +07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} + +07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2875: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:25:18 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2882: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:25:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:26:05 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:26:05 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:26:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:26:05 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:05 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:26:06 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:26:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:26:06 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:26:06 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:26:06 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:26:06 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:26:06 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:26:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1976: Processing security rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2049: Processing system rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] + +07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: system + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: system + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities + +07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False + +07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision + +07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities + +07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:26:07 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. + +07-26-2024 16:26:07 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False + +07-26-2024 16:26:07 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. + +07-26-2024 16:26:07 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:26:07 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:26:07 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:26:07 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:26:07 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:26:07 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991326', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:26:07 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991326', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {}} + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:26:07 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:26:07 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:26:07 WARNING UserandRole: user_requires_update: 2379: Role network-admin not found in current_role. Setting role list to empty. + +07-26-2024 16:26:07 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} + +07-26-2024 16:26:07 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} + +07-26-2024 16:26:07 ERROR UserandRole: get_diff_merged: 1328: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:27:50 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:27:50 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:27:50 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:27:50 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:27:50 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:27:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:27:50 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:27:50 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:27:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:27:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:27:51 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:27:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:27:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:27:51 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:51 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:27:52 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:27:52 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:27:52 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991367', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:27:52 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991367', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {}} + +07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:27:52 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:27:52 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} + +07-26-2024 16:27:52 WARNING UserandRole: user_requires_update: 2380: Role network-admin not found in current_role. Setting role list to empty. + +07-26-2024 16:27:52 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} + +07-26-2024 16:27:52 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} + +07-26-2024 16:27:52 ERROR UserandRole: get_diff_merged: 1329: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name + +07-26-2024 16:28:32 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:28:32 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:28:32 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:28:32 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:32 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:32 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:28:32 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:28:32 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:28:32 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:32 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:32 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:28:32 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:28:32 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:28:33 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:28:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:33 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:33 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} + +07-26-2024 16:28:33 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} + +07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:28:33 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:33 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:34 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:28:34 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:34 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991486', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:34 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991486', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:28:34 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:28:34 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:34 WARNING UserandRole: user_requires_update: 2374: Updating role list with new role ID OBSERVER. + +07-26-2024 16:28:34 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:28:34 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:28:34 DEBUG UserandRole: update_user: 2402: Updating user with parameters: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['OBSERVER'], 'username': 'ajithandrewj', 'userId': '66a378c0f335550043731da6'} + +07-26-2024 16:28:34 DEBUG UserandRole: update_user: 2409: Received API response from update_user: {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}} + +07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}} + +07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}}}} + +07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}}}} + +07-26-2024 16:28:34 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:35 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991514', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:28:35 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']} + +07-26-2024 16:28:35 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} + +07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2876: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:35 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2883: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} + +07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:35 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:35 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:28:35 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:35 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:35 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:35 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:28:35 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:28:35 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:28:35 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:35 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:35 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:28:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:28:36 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}]}} + +07-26-2024 16:28:36 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:28:36 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:36 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} + +07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} + +07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2876: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:28:36 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2883: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} + +07-26-2024 16:28:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:48:27 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:48:27 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:48:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:48:27 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:27 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:48:28 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:28 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 16:48:28 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 16:48:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:28 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:48:28 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:48:28 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:28 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1523: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1648: Role operation is 'create'. Adding default network design entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1714: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1850: Role operation is 'create'. Adding default network services entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1967: Role operation is 'create'. Adding default security entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2041: Role operation is 'create'. Adding default system entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2099: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: create + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_analytics + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: data_access + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: advanced_network_settings + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_hierarchy + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_profiles + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_settings + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: virtual_network + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: app_hosting + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: stealthwatch + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: umbrella + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: group-based_policy + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: system_management + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: event_viewer + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_reasoner + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: search + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: scheduler + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2696: Permission check complete. Any denied operations: True + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:48:28 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:48:28 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:48:28 DEBUG UserandRole: create_role: 1448: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:30 DEBUG UserandRole: create_role: 1455: Received API response from create_role: {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 16:48:30 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 16:48:30 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 16:48:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 16:48:30 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:48:31 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:31 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'} + +07-26-2024 16:48:31 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': '66a386054208d74649686254', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:48:31 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:48:31 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386054208d74649686254', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:48:31 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:48:31 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:31 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:31 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:48:31 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}, {'firstName': 'ajith', 'lastName': 'andrew', 'authSource': 'internal', 'passphraseUpdateTime': '1721903101770', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}]}} + +07-26-2024 16:48:32 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:32 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'} + +07-26-2024 16:48:32 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} + +07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:32 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:48:32 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:48:32 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:32 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} + +07-26-2024 16:48:32 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} + +07-26-2024 16:48:32 INFO UserandRole: get_diff_merged: 1269: User does not need any update + +07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update + +07-26-2024 16:48:32 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:48:32 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}, {'firstName': 'ajith', 'lastName': 'andrew', 'authSource': 'internal', 'passphraseUpdateTime': '1721903101770', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}]}} + +07-26-2024 16:48:33 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:48:33 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'} + +07-26-2024 16:48:33 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} + +07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} + +07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2876: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:48:33 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} + +07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2883: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} + +07-26-2024 16:48:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:49:12 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:49:12 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:49:12 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:49:12 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:12 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:49:13 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 16:49:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 16:49:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:13 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:49:14 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:49:14 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:14 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1523: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1648: Role operation is 'create'. Adding default network design entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1714: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1850: Role operation is 'create'. Adding default network services entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1967: Role operation is 'create'. Adding default security entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2041: Role operation is 'create'. Adding default system entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2099: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: create + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_analytics + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: data_access + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: advanced_network_settings + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_hierarchy + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_profiles + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_settings + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: virtual_network + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: app_hosting + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: stealthwatch + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: umbrella + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: group-based_policy + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: system_management + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: event_viewer + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_reasoner + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: search + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: scheduler + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2696: Permission check complete. Any denied operations: True + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:49:14 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:49:14 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:49:14 DEBUG UserandRole: create_role: 1448: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:16 DEBUG UserandRole: create_role: 1455: Received API response from create_role: {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 16:49:16 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 16:49:16 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 16:49:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 16:49:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:49:16 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:16 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} + +07-26-2024 16:49:16 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1977: Processing security rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2050: Processing system rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... + +07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. + +07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' + +07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] + +07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:16 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... + +07-26-2024 16:49:16 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... + +07-26-2024 16:49:16 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox + +07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: system + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: system + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log + +07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities + +07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log + +07-26-2024 16:49:17 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:17 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False + +07-26-2024 16:49:17 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities + +07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:49:17 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. + +07-26-2024 16:49:17 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False + +07-26-2024 16:49:17 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. + +07-26-2024 16:49:17 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:49:17 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:49:17 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:17 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:49:17 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}]}} + +07-26-2024 16:49:17 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:49:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:49:18 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:49:18 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} + +07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:49:18 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:49:18 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:18 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:49:18 DEBUG UserandRole: create_user: 1419: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['6486ce98ff1f0d0c8be622fb']} + +07-26-2024 16:49:18 ERROR UserandRole: get_diff_merged: 1329: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:59:49 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 16:59:49 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 16:59:49 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:59:49 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:49 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:49 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:59:51 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} + +07-26-2024 16:59:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:59:51 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 16:59:51 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1618: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1880: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1928: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2000: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2029: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2069: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2295: Calling get_permissions to filter permissions... + +07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: update + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_settings + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: compliance + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: device_configuration + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: discovery + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_device + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: topology + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: license + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_telemetry + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: pnp + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: system + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: system + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log + +07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log + +07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: False + +07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2298: Finding denied permissions... + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities + +07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:59:51 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. + +07-26-2024 16:59:51 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: False + +07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2306: No updates required for the role. + +07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 16:59:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:59:52 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:52 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} + +07-26-2024 16:59:52 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2844: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2845: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} + +07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2854: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1618: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1880: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1928: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2000: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2029: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2069: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] + +07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2295: Calling get_permissions to filter permissions... + +07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: update + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_and_troubleshooting + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_settings + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: compliance + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: device_configuration + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: discovery + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_device + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: topology + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: license + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_telemetry + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: pnp + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: system + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: system + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log + +07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log + +07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: False + +07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2298: Finding denied permissions... + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities + +07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] + +07-26-2024 16:59:52 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. + +07-26-2024 16:59:52 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: False + +07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2306: No updates required for the role. + +07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2862: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} + +07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 16:59:52 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 16:59:52 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:52 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 16:59:52 DEBUG UserandRole: get_user: 1481: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}]}} + +07-26-2024 16:59:53 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 16:59:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} + +07-26-2024 16:59:53 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} + +07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 16:59:53 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... + +07-26-2024 16:59:53 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:53 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} + +07-26-2024 16:59:53 WARNING UserandRole: get_diff_merged: 1312: Point + +07-26-2024 16:59:53 DEBUG UserandRole: create_user: 1420: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['6486ce98ff1f0d0c8be622fb']} + +07-26-2024 16:59:53 ERROR UserandRole: get_diff_merged: 1330: Mandatory field not present: An error occurred while creating the user + +07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user + +07-26-2024 17:17:04 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:17:04 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:17:04 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:17:04 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:04 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:04 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:17:05 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 17:17:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 17:17:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:05 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:17:05 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:17:05 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:05 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:17:06 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:17:06 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: create + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: monitoring_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: monitoring_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_analytics + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: data_access + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_analytics + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: data_access + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: advanced_network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: advanced_network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_hierarchy + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_hierarchy + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_profiles + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_profiles + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: virtual_network + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: virtual_network + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: compliance + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: compliance + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: device_configuration + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: device_configuration + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: discovery + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: discovery + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_device + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_device + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: topology + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: topology + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: license + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: license + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_telemetry + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_telemetry + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: pnp + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: pnp + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: provision + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: app_hosting + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: app_hosting + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: stealthwatch + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: stealthwatch + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: umbrella + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: umbrella + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: apis + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: apis + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: events + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: events + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: reports + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: reports + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2598: Permission denied at level: group-based_policy + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.System Management + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system_management + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: event_viewer + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: event_viewer + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_reasoner + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_reasoner + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: search + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: search + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: scheduler + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: scheduler + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: remote_device_support + +07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: remote_device_support + +07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2697: Permission check complete. Any denied operations: True + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].data_access + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_profiles + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].virtual_network + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].compliance + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].license + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].pnp + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].provision + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].app_hosting + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].stealthwatch + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].umbrella + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].apis + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].apis + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].events + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].events + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].reports + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].reports + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].group_based_policy + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].system_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].system_management + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].event_viewer + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].network_reasoner + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].remote_device_support + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].scheduler + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].search + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].search + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities + +07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. + +07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2514: Removing resource due to denied type: network design.network settings + +07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2522: Removing resource due to denied type: network provision.provision + +07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: True + +07-26-2024 17:17:06 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:17:07 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:17:07 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:17:07 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:17:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:17:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:17:08 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:17:08 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} + +07-26-2024 17:17:08 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2844: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2845: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2854: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:17:08 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:21:53 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:21:53 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:21:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:21:53 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:53 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:21:54 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:21:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} + +07-26-2024 17:21:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:21:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:54 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:21:54 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:21:54 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:21:54 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:21:54 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:22:21 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:22:21 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:22:21 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:22:21 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:21 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:22:22 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:22:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} + +07-26-2024 17:22:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:22:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:22 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:22:22 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:22:22 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:22:23 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:22:23 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:22:23 WARNING UserandRole: role_requires_update: 2286: point + +07-26-2024 17:29:07 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:29:07 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:29:07 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:29:07 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:07 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:29:09 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:09 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 17:29:09 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 17:29:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:09 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:29:09 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:29:09 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:09 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings + +07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision + +07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True + +07-26-2024 17:29:09 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:11 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:29:11 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:29:11 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:29:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:29:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:29:11 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} + +07-26-2024 17:29:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:12 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:29:12 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:29:12 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:29:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:29:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:29:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:29:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:29:20 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:20 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} + +07-26-2024 17:29:20 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:29:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:29:20 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:29:20 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:21 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:29:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:29:21 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 17:29:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 17:29:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:29:21 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:29:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:29:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} + +07-26-2024 17:29:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:29:22 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:29:22 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:29:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:31:42 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:31:42 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:31:42 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:31:42 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:42 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:42 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:31:43 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:43 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 17:31:43 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 17:31:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:43 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:31:43 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:31:43 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:43 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2601: Permission denied at level: compliance + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True + +07-26-2024 17:31:43 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings + +07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision + +07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True + +07-26-2024 17:31:44 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:45 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:31:45 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:31:45 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:31:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:31:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:31:46 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:31:46 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} + +07-26-2024 17:31:46 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:31:47 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:31:47 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:31:47 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:31:47 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:31:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:34:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:34:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:34:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:34:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:34:21 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} + +07-26-2024 17:34:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:34:21 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:34:21 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:34:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1233: Role does not need any update + +07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update + +07-26-2024 17:34:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:34:22 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:34:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} + +07-26-2024 17:34:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:34:22 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:34:22 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:34:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:41:39 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:41:39 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:41:39 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:41:39 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:39 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:41:40 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} + +07-26-2024 17:41:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:41:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:41:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:41:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:40 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2540: Removing resource due to denied type: event viewer + +07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True + +07-26-2024 17:41:41 WARNING UserandRole: role_requires_update: 2306: Role update required. Changes detected. + +07-26-2024 17:41:41 DEBUG UserandRole: update_role: 2431: Update role with role_info_params: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:43 DEBUG UserandRole: update_role: 2438: Received API response from update_role: {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 17:41:43 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}} + +07-26-2024 17:41:43 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 17:41:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}}}} + +07-26-2024 17:41:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:41:44 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735', 'lastModified': '1721995903784'}, 'roleId': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:41:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'} + +07-26-2024 17:41:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a3927e4208d74649686538', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:41:44 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:41:44 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a3927e4208d74649686538', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:41:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:42:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated + +07-26-2024 17:42:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} + +07-26-2024 17:42:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. + +07-26-2024 17:42:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:42:20 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} + +07-26-2024 17:42:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} + +07-26-2024 17:42:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... + +07-26-2024 17:42:21 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... + +07-26-2024 17:42:21 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:21 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. + +07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings + +07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision + +07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2540: Removing resource due to denied type: event viewer + +07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True + +07-26-2024 17:42:21 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:23 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:42:23 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}} + +07-26-2024 17:42:23 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:42:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}}}} + +07-26-2024 17:42:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... + +07-26-2024 17:42:23 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995942182'}, 'roleId': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}]}} + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. + +07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. + +07-26-2024 17:42:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'} + +07-26-2024 17:42:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}, 'role_exists': True} + +07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} + +07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + +07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... + +07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} + +07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... + +07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. + +07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. + +07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None + +07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1978: Processing security rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2051: Processing system rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} + +07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] + +07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... + +07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... + +07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: license + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: license + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: events + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: events + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: search + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: search + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support + +07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support + +07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a392a64208d746496865e1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False + +07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities + +07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] + +07-26-2024 17:42:24 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. + +07-26-2024 17:42:24 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False + +07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. + +07-26-2024 17:42:24 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a392a64208d746496865e1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} + +07-26-2024 17:42:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. + diff --git a/playbooks/user_role_workflow_manager.yml b/playbooks/user_role_workflow_manager.yml index 32e2993e38..3bd5c8faa0 100644 --- a/playbooks/user_role_workflow_manager.yml +++ b/playbooks/user_role_workflow_manager.yml @@ -1,5 +1,5 @@ --- -- name: Configure device credentials on Cisco DNA Center +- name: Configure device credentials on Cisco Catalyst Center hosts: localhost vars_files: - "credentials.yml" @@ -28,7 +28,7 @@ username: "ajithandrewj" email: "ajith.andrew@example.com" password: "Ajith@123" - role_list: ["Super-Admin-Role"] + role_list: ["Super-Admin-role"] - first_name: "syed" last_name: "khadeer" username: "syedkhadeer" @@ -61,11 +61,10 @@ security: - overall: "deny" ip_based_access_control: "read" - security_advisories: "deny" + security_advisories: "write" system: - overall: "deny" machine_reasoning: "write" - system_management: "deny" utilities: - overall: "deny" audit_log: "read" diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index 3e2362ec82..5bacd0d063 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -5,7 +5,7 @@ from __future__ import absolute_import, division, print_function __metaclass__ = type -__author__ = ("Ajith Andrew J, Syed khadeer Ahmed, Madhan Sankaranarayanan") +__author__ = ("Ajith Andrew J, Syed khadeer Ahmed, Rangaprabhu Deenadayalu, Madhan Sankaranarayanan") DOCUMENTATION = r""" --- @@ -54,7 +54,7 @@ email: description: - The email address of the user (e.g., syedkhadeerahmed@example.com). - - Used to fetch user data if the username is forgotten. + - Used to retrieve user data if the username is forgotten. - Required for user deletion if the username is forgotten. type: str password: @@ -1304,9 +1304,12 @@ def get_diff_merged(self, config): self.log("Role ID for {0} not found in current_role_id_config".format(str(role_name))) if "role_list" not in user_details: - user_details["role_list"] = ["6486ce98ff1f0d0c8be622fb"] + default_role = self.have.get("current_role_id_config") + if default_role: + user_details["role_list"] = [default_role.get("observer-role")] if user_details.get("role_list"): + self.log("Point") user_info_params = self.snake_to_camel_case(user_details) task_response = self.create_user(user_info_params) else: @@ -1392,6 +1395,10 @@ def get_current_config(self, input_config): for role in roles: if role.get("name").lower() == role_name.lower(): current_role_id[role.get("name").lower()] = role.get("role_id") + else: + for role in roles: + if role.get("name").lower() == "observer-role": + current_role_id[role.get("name").lower()] = role.get("role_id") return user_exists, current_user_configuration, current_role_id @@ -1494,6 +1501,16 @@ def get_role(self): self.log("Received API response from get_roles_api: {0}".format(str(response)), "DEBUG") return response + def add_entries(self, entry_types, operations, unique_types): + """Add multiple entries with specified operations to the unique_types dictionary.""" + for entry_type in entry_types: + new_entry = { + "type": entry_type, + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry: {0}".format(new_entry)) + def process_assurance_rules(self, role_config, role_operation, unique_types): """ Process the assurance rules and update the unique_types dictionary with the corresponding operations. @@ -1502,73 +1519,64 @@ def process_assurance_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "assurance" in role_config and role_config.get("assurance") is not None: - if role_operation != "update": - default_entries = [ - "Assurance.Monitoring and Troubleshooting", - "Assurance.Monitoring Settings", - "Assurance.Troubleshooting Tools" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - for assurance in role_config["assurance"]: - for resource, permission in assurance.items(): + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default assurance entries.") + default_entry_types = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default assurance entries.") + + self.log("Processing assurance rules.") + + # Process each assurance rule + if role_config["assurance"] is not None: + for assurance_rule in role_config["assurance"]: + for resource_name, permission in assurance_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() - if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for assurance resource {1}".format(permission, resource)} + permission = permission.lower() - if permission != "deny": - operations = self.convert_permission_to_operations(permission) - - if resource == "overall": - new_entries = [ - "Assurance.Monitoring and Troubleshooting", - "Assurance.Monitoring Settings", - "Assurance.Troubleshooting Tools" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for assurance resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - elif resource == "monitoring_and_troubleshooting": - new_entry = { - "type": "Assurance.Monitoring and Troubleshooting", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "Assurance.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Assurance.Monitoring and Troubleshooting", - "Assurance.Monitoring Settings", - "Assurance.Troubleshooting Tools" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + self.add_entries(overall_entry_types, operations, unique_types) + elif resource_name == "monitoring_and_troubleshooting": + new_entry = { + "type": "Assurance.Monitoring and Troubleshooting", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'monitoring_and_troubleshooting': {0}".format(new_entry)) + else: + new_entry = { + "type": "Assurance.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_network_analytics_rules(self, role_config, role_operation, unique_types): """ @@ -1578,49 +1586,55 @@ def process_network_analytics_rules(self, role_config, role_operation, unique_ty - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "network_analytics" in role_config and role_config.get("network_analytics") is not None: - if role_operation != "update": - new_entry = { - "type": "Network Analytics.Data Access", - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default network analytics entries.") + default_entry_types = { + "type": "Network Analytics.Data Access", + "operations": ["gRead"] + } + unique_types[default_entry_types["type"]] = default_entry_types + else: + self.log("Role operation is not 'create'. Skipping default network analytics entries.") + + self.log("Processing network analytics rules.") - for network_analytics in role_config["network_analytics"]: - for resource, permission in network_analytics.items(): + # Process each network analytics rule + if role_config["network_analytics"] is not None: + for network_analytics_rule in role_config["network_analytics"]: + for resource_name, permission in network_analytics_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() + + permission = permission.lower() if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for network analytics resource {1}".format(permission, resource)} + error_message = "Invalid permission {0} for network analytics resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - if resource == "overall": - new_entry = { - "type": "Network Analytics.Data Access", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) - else: - new_entry = { - "type": "Network Analytics.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - new_entry = { - "type": "Network Analytics.Data Access", - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + if resource_name == "overall": + overall_entry_types = { + "type": "Network Analytics.Data Access", + "operations": operations + } + unique_types[overall_entry_types["type"]] = overall_entry_types + else: + new_entry = { + "type": "Network Analytics.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_network_design_rules(self, role_config, role_operation, unique_types): """ @@ -1630,76 +1644,63 @@ def process_network_design_rules(self, role_config, role_operation, unique_types - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "network_design" in role_config and role_config.get("network_design") is not None: - if role_operation != "update": - default_entries = [ - "Network Design.Advanced Network Settings", - "Network Design.Image Repository", - "Network Design.Network Hierarchy", - "Network Design.Network Profiles", - "Network Design.Network Settings", - "Network Design.Virtual Network" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - - for network_design in role_config["network_design"]: - for resource, permission in network_design.items(): + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default network design entries.") + default_entry_types = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default network design entries.") + + self.log("Processing network design rules.") + + # Process each network design rule + if role_config["network_design"] is not None: + for network_design_rule in role_config["network_design"]: + for resource_name, permission in network_design_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() - if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for network design resource {1}".format(permission, resource)} + permission = permission.lower() - if permission != "deny": - operations = self.convert_permission_to_operations(permission) + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network design resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - if resource == "overall": - new_entries = [ - "Network Design.Advanced Network Settings", - "Network Design.Image Repository", - "Network Design.Network Hierarchy", - "Network Design.Network Profiles", - "Network Design.Network Settings", - "Network Design.Virtual Network" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "Network Design.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Network Design.Advanced Network Settings", - "Network Design.Image Repository", - "Network Design.Network Hierarchy", - "Network Design.Network Profiles", - "Network Design.Network Settings", - "Network Design.Virtual Network" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + self.add_entries(overall_entry_types, operations, unique_types) + else: + new_entry = { + "type": "Network Design.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_network_provision_rules(self, role_config, role_operation, unique_types): """ @@ -1709,147 +1710,133 @@ def process_network_provision_rules(self, role_config, role_operation, unique_ty - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "network_provision" in role_config and role_config.get("network_provision") is not None: - if role_operation != "update": - default_entries = [ - "Network Provision.Compliance", - "Network Provision.EoX", - "Network Provision.Image Update", - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology", - "Network Provision.License", - "Network Provision.Network Telemetry", - "Network Provision.PnP", - "Network Provision.Provision" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default network provision entries.") + default_entry_types = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default network provision entries.") + + self.log("Processing network provision rules.") + # Process each network provision rule + if role_config["network_provision"] is not None: if not isinstance(role_config["network_provision"], list): - return {"error": "The given network_provision is not in type: list"} + error_message = "The given network_provision is not in type: list" + self.log(error_message) + return {"error": error_message} for provision in role_config["network_provision"]: - for resource, permission in provision.items(): + for resource_name, permission in provision.items(): if isinstance(permission, list): # Handle nested inventory_management - for sub_resource, sub_permission in permission[0].items(): + for sub_resource_name, sub_permission in permission[0].items(): if sub_permission is None: + self.log("Skipping sub-resource {0} because permission is None".format(sub_resource_name)) continue - else: - sub_permission = sub_permission.lower() + + sub_permission = sub_permission.lower() if sub_permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for network provision for \ - sub-resource {1}".format(str(sub_permission), str(sub_resource))} - if sub_permission != "deny": - operations = self.convert_permission_to_operations(sub_permission) - - if sub_resource == "overall": - new_entries = [ - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + error_message = "Invalid permission {0} for network provision for sub-resource {1}".format(sub_permission, sub_resource_name) + self.log(error_message) + return {"error": error_message} - else: - new_entry = { - "type": "Network Provision.{0}.{1}".format(resource.replace("_", " ").title(), sub_resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if sub_permission == "deny": + self.log("Skipping sub-resource {0} because permission is 'deny'".format(sub_resource_name)) + continue - else: - if permission is None: - continue - else: - permission = permission.lower() + operations = self.convert_permission_to_operations(sub_permission) + self.log("Converted sub-permission {0} to operations {1}".format(sub_permission, operations)) - if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for network provision resource {1}".format(str(permission), str(resource))} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) - - if resource == "overall": - new_entries = [ - "Network Provision.Compliance", - "Network Provision.EoX", - "Network Provision.Image Update", + if sub_resource_name == "overall": + overall_entry_types = [ "Network Provision.Inventory Management.Device Configuration", "Network Provision.Inventory Management.Discovery", "Network Provision.Inventory Management.Network Device", "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology", - "Network Provision.License", - "Network Provision.Network Telemetry", - "Network Provision.PnP", - "Network Provision.Provision" + "Network Provision.Inventory Management.Topology" ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - - elif resource == "eox": + self.add_entries(overall_entry_types, operations, unique_types) + else: new_entry = { - "type": "Network Provision.EoX", + "type": "Network Provision.{0}.{1}".format(resource_name.replace("_", " ").title(), + sub_resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(sub_resource_name, new_entry)) + else: + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) + continue - elif resource == "pnp": - new_entry = { - "type": "Network Provision.PnP", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + permission = permission.lower() - else: - new_entry = { - "type": "Network Provision.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Network Provision.Compliance", - "Network Provision.EoX", - "Network Provision.Image Update", - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology", - "Network Provision.License", - "Network Provision.Network Telemetry", - "Network Provision.PnP", - "Network Provision.Provision" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network provision resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + self.add_entries(overall_entry_types, operations, unique_types) + elif resource_name == "eox": + new_entry = { + "type": "Network Provision.EoX", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'eox': {0}".format(new_entry)) + elif resource_name == "pnp": + new_entry = { + "type": "Network Provision.PnP", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'pnp': {0}".format(new_entry)) + else: + new_entry = { + "type": "Network Provision.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_network_services_rules(self, role_config, role_operation, unique_types): """ @@ -1859,69 +1846,59 @@ def process_network_services_rules(self, role_config, role_operation, unique_typ - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "network_services" in role_config and role_config.get("network_services") is not None: - if role_operation != "update": - default_entries = [ - "Network Services.App Hosting", - "Network Services.Bonjour", - "Network Services.Stealthwatch", - "Network Services.Umbrella" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - - for services in role_config["network_services"]: - for resource, permission in services.items(): + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default network services entries.") + default_entry_types = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default network services entries.") + + self.log("Processing network services rules.") + + # Process each network service rule + if role_config["network_services"] is not None: + for services_rule in role_config["network_services"]: + for resource_name, permission in services_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() + + permission = permission.lower() if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for network services resource {1}".format(permission, resource)} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) + error_message = "Invalid permission {0} for network services resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - if resource == "overall": - new_entries = [ - "Network Services.App Hosting", - "Network Services.Bonjour", - "Network Services.Stealthwatch", - "Network Services.Umbrella" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "Network Services.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Network Services.App Hosting", - "Network Services.Bonjour", - "Network Services.Stealthwatch", - "Network Services.Umbrella" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + self.add_entries(overall_entry_types, operations, unique_types) + else: + new_entry = { + "type": "Network Services.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_platform_rules(self, role_config, unique_types): """ @@ -1930,46 +1907,53 @@ def process_platform_rules(self, role_config, unique_types): - role_config (dict): The role configuration containing platform rules. - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "platform" in role_config and role_config.get("platform") is not None: - for platform in role_config["platform"]: - for resource, permission in platform.items(): + self.log("Processing platform rules.") + + # Process each platform rule + if role_config["platform"] is not None: + for platform_rule in role_config["platform"]: + for resource_name, permission in platform_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() + + permission = permission.lower() if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for platform resource {1}".format(permission, resource)} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) - if resource == "overall": - new_entries = [ - "Platform.APIs", - "Platform.Bundles", - "Platform.Events", - "Platform.Reports" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + error_message = "Invalid permission {0} for platform resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - elif resource == "apis": - new_entry = { - "type": "Platform.APIs", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "Platform.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Platform.APIs", + "Platform.Bundles", + "Platform.Events", + "Platform.Reports" + ] + self.add_entries(overall_entry_types, operations, unique_types) + elif resource_name == "apis": + new_entry = { + "type": "Platform.APIs", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'apis': {0}".format(new_entry)) + else: + new_entry = { + "type": "Platform.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_security_rules(self, role_config, role_operation, unique_types): """ @@ -1979,80 +1963,71 @@ def process_security_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "security" in role_config and role_config.get("security") is not None: - if role_operation != "update": - default_entries = [ - "Security.Group-Based Policy", - "Security.IP Based Access Control", - "Security.Security Advisories" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - - for security in role_config["security"]: - for resource, permission in security.items(): + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default security entries.") + default_entry_types = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default security entries.") + + self.log("Processing security rules.") + + # Process each security rule + if role_config["security"] is not None: + for security_rule in role_config["security"]: + for resource_name, permission in security_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() - - if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for security resource {1}".format(permission, resource)} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) - if resource == "overall": - new_entries = [ - "Security.Group-Based Policy", - "Security.IP Based Access Control", - "Security.Security Advisories" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + permission = permission.lower() - elif resource == "ip_based_access_control": - new_entry = { - "type": "Security.IP Based Access Control", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for security resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - elif resource == "group_based_policy": - new_entry = { - "type": "Security.Group-Based Policy", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "Security.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Security.Group-Based Policy", - "Security.IP Based Access Control", - "Security.Security Advisories" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + self.add_entries(overall_entry_types, operations, unique_types) + elif resource_name == "ip_based_access_control": + new_entry = { + "type": "Security.IP Based Access Control", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'ip_based_access_control': {0}".format(new_entry)) + elif resource_name == "group_based_policy": + new_entry = { + "type": "Security.Group-Based Policy", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'group_based_policy': {0}".format(new_entry)) + else: + new_entry = { + "type": "Security.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_system_rules(self, role_config, role_operation, unique_types): """ @@ -2062,63 +2037,55 @@ def process_system_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "system" in role_config and role_config.get("system") is not None: - if role_operation != "update": - default_entries = [ - "System.Machine Reasoning", - "System.System Management" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - - for system in role_config["system"]: - for resource, permission in system.items(): + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default system entries.") + default_entry_types = [ + "System.Machine Reasoning", + "System.System Management" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + else: + self.log("Role operation is not 'create'. Skipping default system entries.") + + self.log("Processing system rules.") + + # Process each system rule + if role_config["system"] is not None: + for system_rule in role_config["system"]: + for resource_name, permission in system_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() + + permission = permission.lower() if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for system resource {1}".format(permission, resource)} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) + error_message = "Invalid permission {0} for system resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - if resource == "overall": - new_entries = [ - "System.Machine Reasoning", - "System.System Management" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - else: - new_entry = { - "type": "System.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "System.Machine Reasoning", - "System.System Management" - ] - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "System.Machine Reasoning", + "System.System Management" + ] + self.add_entries(overall_entry_types, operations, unique_types) + else: + new_entry = { + "type": "System.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def process_utilities_rules(self, role_config, role_operation, unique_types): """ @@ -2128,156 +2095,127 @@ def process_utilities_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - if "utilities" in role_config and role_config.get("utilities") is not None: - if role_operation != "update": - default_entries = [ - "Utilities.Event Viewer", - "Utilities.Network Reasoner", - "Utilities.Search" - ] - new_entry1 = { - "type": "Utilities.Scheduler", - "operations": ["gRead", "gUpdate", "gCreate", "gRemove"] - } - unique_types[new_entry1["type"]] = new_entry1 + # Determine if default entries should be added based on role_operation + if role_operation == "create": + self.log("Role operation is 'create'. Adding default utilities entries.") + default_entry_types = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search" + ] + self.add_entries(default_entry_types, ["gRead"], unique_types) + new_entry1 = { + "type": "Utilities.Scheduler", + "operations": ["gRead", "gUpdate", "gCreate", "gRemove"] + } + unique_types[new_entry1["type"]] = new_entry1 - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry + else: + self.log("Role operation is not 'create'. Skipping default utilities entries.") + + self.log("Processing utilities rules.") - for utilities in role_config["utilities"]: - for resource, permission in utilities.items(): + # Process each utilities rule + if role_config["utilities"] is not None: + for utilities_rule in role_config["utilities"]: + for resource_name, permission in utilities_rule.items(): if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name)) continue - else: - permission = permission.lower() - if permission not in ["read", "write", "deny"]: - return {"error": "Invalid permission {0} for utilities resource {1}".format(permission, resource)} - if permission != "deny": - operations = self.convert_permission_to_operations(permission) + permission = permission.lower() - if resource == "overall": - new_entries = [ - "Utilities.Event Viewer", - "Utilities.Network Reasoner", - "Utilities.Search", - "Utilities.Audit Log", - "Utilities.Remote Device Support", - "Utilities.Scheduler" - ] - for entry in new_entries: - new_entry = { - "type": entry, - "operations": operations - } - unique_types[new_entry["type"]] = new_entry + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for utilities resource {1}".format(permission, resource_name) + self.log(error_message) + return {"error": error_message} - else: - new_entry = { - "type": "Utilities.{0}".format(resource.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - return {} - else: - if role_operation != "update": - default_entries = [ - "Utilities.Event Viewer", - "Utilities.Network Reasoner", - "Utilities.Search" - ] - new_entry1 = { - "type": "Utilities.Scheduler", - "operations": ["gRead", "gUpdate", "gCreate", "gRemove"] - } - unique_types[new_entry1["type"]] = new_entry1 + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + continue - for entry in default_entries: - new_entry = { - "type": entry, - "operations": ["gRead"] - } - unique_types[new_entry["type"]] = new_entry - return {} + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations)) + + if resource_name == "overall": + overall_entry_types = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search", + "Utilities.Audit Log", + "Utilities.Remote Device Support", + "Utilities.Scheduler" + ] + self.add_entries(overall_entry_types, operations, unique_types) + else: + new_entry = { + "type": "Utilities.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + return {} def generate_role_payload(self, role_config, role_operation): """ Generate a role payload for Cisco Catalyst Center. + Parameters: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - role_config (dict): A dictionary containing the configuration for the role. + Returns: - payload (dict): A dictionary containing the payload for the role with processed resource types and operations. + Description: - Generates a payload for a role based on the given role configuration. - Processes various sections of the role configuration, such as assurance, network analytics, - network design, network provision, network services, platform, security, system, and utilities. + network design, network provision, network services, platform, security, system, and utilities. - Validates permissions and converts them to corresponding operations using the convert_permission_to_operations method. - If the permission is valid and not set to "deny", constructs a resource type entry with operations and appends it to resource_types. - The final payload includes the role name, description, and the list of resource types with operations. """ - self.log("Generate payload for role creation/updation...") + self.log("Starting payload generation for role...") + + # Extract role name and description from the configuration role_name = role_config.get("role_name", "") description = role_config.get("description", "") - resource_types = [] unique_types = {} - function_responce = self.process_assurance_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_network_analytics_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_network_design_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_network_provision_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_network_services_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_platform_rules(role_config, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_security_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - function_responce = self.process_system_rules(role_config, role_operation, unique_types) - if function_responce: - return function_responce - - function_responce = self.process_utilities_rules(role_config, role_operation, unique_types) - - if function_responce: - return function_responce - - resource_types = list(unique_types.values()) + # List of functions to process each section of role configuration + processing_functions = [ + self.process_assurance_rules, + self.process_network_analytics_rules, + self.process_network_design_rules, + self.process_network_provision_rules, + self.process_network_services_rules, + self.process_platform_rules, + self.process_security_rules, + self.process_system_rules, + self.process_utilities_rules + ] + + # Process each section and check for errors + for process_func in processing_functions: + func_name = process_func.__name__ + self.log("Processing with {0}...".format(func_name)) + if func_name in "process_platform_rules": + function_response = process_func(role_config, unique_types) + else: + function_response = process_func(role_config, role_operation, unique_types) + if function_response: + self.log("Error occurred in {0}: {1}".format(func_name, function_response)) + return function_response # Construct the final payload + resource_types_list = list(unique_types.values()) + self.log("Generated resource types: {0}".format(resource_types_list)) payload = { "role": role_name, "description": description, - "resourceTypes": resource_types + "resourceTypes": resource_types_list } + self.log("Generated payload: {0}".format(payload)) return payload @@ -2318,49 +2256,58 @@ def role_requires_update(self, current_role, desired_role): - Removes denied operations based on denied permissions found in self.want. - Returns values indicating whether updates are required and the updated role information. """ + self.log("Starting role comparison for updates...") update_required = False + update_role_params = {} for want_resource in desired_role["resourceTypes"]: - found = False + resource_found = False for have_resource in current_role["resource_types"]: if have_resource["type"] == want_resource["type"]: - found = True + resource_found = True if have_resource["operations"] != want_resource["operations"]: + self.log("Updating operations for resource type {0}.".format(want_resource["type"])) have_resource["operations"] = want_resource["operations"] update_required = True break - if not found: + if not resource_found: + self.log("Adding new resource type {0} to current role.".format(want_resource["type"])) current_role["resource_types"].append(want_resource) update_required = True - update_role_param = {} - if desired_role.get("description") is not None: - if current_role.get("description") != desired_role.get("description"): - update_role_param["description"] = desired_role["description"] - update_required = True - elif "description" not in update_role_param: - update_role_param["description"] = current_role["description"] + # Compare and update first name + desired_description = desired_role.get("description") + current_description = current_role.get("description") + if desired_description is not None: + if current_description != desired_description: + self.log("Updating description from {0} to {1}.".format(current_description, desired_description)) + update_role_params["description"] = desired_description + update_needed = True + elif "description" not in update_role_params: + update_role_params["description"] = current_description else: - update_role_param["description"] = current_role["description"] + update_role_params["description"] = current_description # Create the updated dictionary updated_get_have = { "roleId": current_role["role_id"], - "description": update_role_param["description"], + "description": update_role_params["description"], "resourceTypes": current_role["resource_types"] } + self.log("Calling get_permissions to filter permissions...") filtered_data, overall_update_required = self.get_permissions(self.want, updated_get_have, "update") + self.log("Finding denied permissions...") denied_permissions = self.find_denied_permissions(self.want) denied_update_required, updated_get_have = self.remove_denied_operations(filtered_data, denied_permissions) if update_required or denied_update_required or overall_update_required: - role_update_required = True - return role_update_required, updated_get_have - else: - role_update_required = False - return role_update_required, updated_get_have + self.log("Role update required. Changes detected.") + return True, updated_get_have + + self.log("No updates required for the role.") + return False, updated_get_have def user_requires_update(self, current_user, current_role): """ @@ -2371,59 +2318,78 @@ def user_requires_update(self, current_user, current_role): - current_role (dict): Dictionary containing role mappings. Returns: - bool: True if the user requires updates, False otherwise. - - update_user_param (dict): Dictionary containing parameters that need to be updated. + - update_user_params (dict): Dictionary containing parameters that need to be updated. Description: - This method checks if the current user information needs to be updated based on the desired user information. - It compares specific fields such as "first_name", "last_name", "email", "username", and "role_list". - - If any of these fields differ between current_user and self.want, update_user_param is populated with the desired values. + - If any of these fields differ between current_user and self.want, update_user_params is populated with the desired values. - Returns values indicating whether updates are required and the parameters to update if so. """ - update_required = False - update_user_param = {} - - if self.want.get("first_name") is not None: - if current_user.get("first_name") != self.want.get("first_name"): - update_user_param["first_name"] = self.want["first_name"] - update_required = True - elif "first_name" not in update_user_param: - update_user_param["first_name"] = current_user["first_name"] + update_needed = False + update_user_params = {} + + # Compare and update first name + desired_first_name = self.want.get("first_name") + current_first_name = current_user.get("first_name") + if desired_first_name is not None: + if current_first_name != desired_first_name: + self.log("Updating first name from {0} to {1}.".format(current_first_name, desired_first_name)) + update_user_params["first_name"] = desired_first_name + update_needed = True + elif "first_name" not in update_user_params: + update_user_params["first_name"] = current_first_name else: - update_user_param["first_name"] = current_user["first_name"] - - if self.want.get("last_name") is not None: - if current_user.get("last_name") != self.want.get("last_name"): - update_user_param["last_name"] = self.want["last_name"] - update_required = True - elif "last_name" not in update_user_param: - update_user_param["last_name"] = current_user["last_name"] + update_user_params["first_name"] = current_first_name + + # Compare and update last name + desired_last_name = self.want.get("last_name") + current_last_name = current_user.get("last_name") + if desired_last_name is not None: + if current_last_name != desired_last_name: + self.log("Updating last name from {0} to {1}.".format(current_last_name, desired_last_name)) + update_user_params["last_name"] = desired_last_name + update_needed = True + elif "last_name" not in update_user_params: + update_user_params["last_name"] = current_last_name else: - update_user_param["last_name"] = current_user["last_name"] - - if self.want.get("email") is not None: - if current_user.get("email") != self.want.get("email"): - update_user_param["email"] = self.want["email"] - update_required = True - elif "email" not in update_user_param: - update_user_param["email"] = current_user["email"] + update_user_params["last_name"] = current_last_name + + # Compare and update email + desired_email = self.want.get("email") + current_email = current_user.get("email") + if desired_email is not None: + if current_email != desired_email: + self.log("Updating email from {0} to {1}.".format(current_email, desired_email)) + update_user_params["email"] = desired_email + update_needed = True + elif "email" not in update_user_params: + update_user_params["email"] = current_email else: - update_user_param["email"] = current_user["email"] - - if self.want.get("role_list") is not None: - role_name = self.want.get("role_list")[0].lower() - if role_name in current_role: - role_id = current_role[role_name] - if current_user.get("role_list")[0] != role_id: - update_user_param["role_list"] = [role_id] - update_required = True + update_user_params["email"] = current_email + + # Compare and update role list + desired_role_list = self.want.get("role_list") + current_role_list = current_user.get("role_list", []) + if desired_role_list is not None: + desired_role_name = desired_role_list[0].lower() + if desired_role_name in current_role: + role_id = current_role[desired_role_name] + if current_role_list[0] != role_id: + self.log("Updating role list with new role ID {0}.".format(role_id)) + update_user_params["role_list"] = [role_id] + update_needed = True else: - update_user_param["role_list"] = current_user["role_list"] + update_user_params["role_list"] = current_role_list else: - update_user_param["role_list"] = [] - update_required = True + self.log("Role {0} not found in current_role. Setting role list to empty.".format(desired_role_name)) + update_user_params["role_list"] = [] + update_needed = True else: - update_user_param["role_list"] = current_user["role_list"] + update_user_params["role_list"] = current_role_list + + self.log("User update parameters: {0}".format(update_user_params)) - return update_required, update_user_param + return update_needed, update_user_params def update_user(self, user_params): """ @@ -2715,7 +2681,7 @@ def get_permissions(self, config, input_data, role_operation): "operations": operations if not specific_operations else specific_operations }) - if role_operation != "update": + if role_operation == "create": result = { "role": input_data["role"], "description": input_data["description"], diff --git a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json index 6b2bd03fb2..10783e0639 100644 --- a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json +++ b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json @@ -363,7 +363,7 @@ "lastModified": "1717390238774" }, "roleId": "6486ce97ff1f0d0c8be622f6", - "name": "SUPER-ADMIN-ROLE", + "name": "OBSERVER-ROLE", "description": "For LTTS Team", "type": "CUSTOM" }] @@ -711,9 +711,9 @@ ], "utilities": [ { - "overall": "write", + "overall": "deny", "audit_log": "read", - "event_viewer": "read", + "event_viewer": "deny", "network_reasoner": "write", "remote_device_support": "write", "scheduler": "write", diff --git a/tests/unit/modules/dnac/test_user_role_workflow_manager.py b/tests/unit/modules/dnac/test_user_role_workflow_manager.py index 94c17522b1..ba64d21c32 100644 --- a/tests/unit/modules/dnac/test_user_role_workflow_manager.py +++ b/tests/unit/modules/dnac/test_user_role_workflow_manager.py @@ -1,4 +1,4 @@ -# Copyright (c) 2020 Cisco and/or its affiliates. +# Copyright (c) 2024 Cisco and/or its affiliates. # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. From da0081f5bef4e04dc6fa4a979ed34116eed337ee Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 09:50:07 +0530 Subject: [PATCH 100/119] dnac.log file has been deleted --- playbooks/dnac.log | 74850 ------------------------------------------- 1 file changed, 74850 deletions(-) delete mode 100644 playbooks/dnac.log diff --git a/playbooks/dnac.log b/playbooks/dnac.log deleted file mode 100644 index 110159ef4d..0000000000 --- a/playbooks/dnac.log +++ /dev/null @@ -1,74850 +0,0 @@ -07-26-2024 11:10:27 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:10:27 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:10:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:10:27 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:10:27 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-06-07 13:55:25.748290149 +0000 UTC m=+61.726074013', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:27 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 11:10:27 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:10:27 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:10:27 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:27 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:10:27 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: create - -07-26-2024 11:10:27 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:27 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:10:27 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:10:27 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:10:28 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:28 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:10:28 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:28 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:10:28 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:10:28 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:28 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 11:10:28 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 11:10:28 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 11:10:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 11:10:28 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:10:29 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:29 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:10:29 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:10:29 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:10:29 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:29 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:10:29 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:29 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:10:29 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:10:29 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:10:54 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:10:54 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:10:54 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:10:54 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:54 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:10:55 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:10:55 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:10:55 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:10:55 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:55 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:10:55 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 11:10:55 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:10:55 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:10:55 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:10:55 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:10:55 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:10:55 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:10:55 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:55 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:10:55 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are [] - -07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:10:55 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:10:55 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:10:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:11:23 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:11:23 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:11:23 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:11:23 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:11:23 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:40:31.92977244 +0000 UTC m=+352814.152249278', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:11:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:40:31.923306992 +0000 UTC m=+352814.145783830'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:11:23 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:11:23 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:23 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:11:23 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:11:23 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:11:23 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:23 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:11:24 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:24 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:11:24 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:24 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:11:24 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:11:24 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:24 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:11:24 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:11:24 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:11:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:11:24 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:11:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:11:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:11:25 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:11:25 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:25 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:11:25 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:25 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:11:25 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:11:25 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:11:44 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:11:44 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:11:44 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:11:44 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:11:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:11:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:11:44 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:11:44 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:44 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:11:44 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:11:44 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:11:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:11:45 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 11:11:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 11:11:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:11:45 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:11:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:11:45 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:11:45 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:11:45 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:11:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:11:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:11:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:11:45 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:11:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:12:01 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:12:01 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:12:01 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:12:01 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:01 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:01 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:01 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:01 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:12:02 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:41:27.834111572 +0000 UTC m=+352870.056588410', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:02 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:02 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:12:02 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:41:27.833228947 +0000 UTC m=+352870.055705784'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:12:02 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:02 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:12:02 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:12:02 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:02 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:02 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:12:02 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:12:02 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:12:02 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:12:02 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:12:02 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:12:02 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:12:03 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:12:03 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:12:03 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:12:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:12:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:12:03 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:12:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:12:03 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:12:03 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:12:03 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:12:03 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:12:03 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:12:03 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:12:03 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:12:03 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:12:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:03 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:13:03 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:13:03 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:13:03 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:03 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:42:06.53477761 +0000 UTC m=+352908.757254447', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:03 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:03 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:03 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:42:06.534034325 +0000 UTC m=+352908.756511164'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:13:03 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:13:03 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:03 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:03 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:03 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:03 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:03 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:04 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:04 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:04 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:04 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:13:04 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:13:04 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:04 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:04 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:04 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:04 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:05 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:05 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:05 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:05 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:05 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:05 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:13:05 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:13:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:09 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:13:09 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:13:09 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:13:09 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:09 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:09 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:10 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:07.875196986 +0000 UTC m=+352970.097673823', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:07.874451574 +0000 UTC m=+352970.096928412'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:10 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:13:10 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:13:10 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:10 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:10 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:10 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:10 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:10 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:13:10 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:13:10 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:11 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:11 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:11 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:11 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:11 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:11 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:13:11 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:11 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:13:11 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:13:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:33 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:13:33 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:13:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:13:33 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:33 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:34 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:14.058622894 +0000 UTC m=+352976.281099749', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:34 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:34 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:43:14.057838162 +0000 UTC m=+352976.280314999'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:34 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:13:34 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:13:34 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:34 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:34 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': []} - -07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:34 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:13:34 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings - -07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:34 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:34 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:34 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:34 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:13:34 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:35 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:35 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:13:35 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:13:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:35 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:35 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:35 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:35 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:35 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:35 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:35 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:35 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:35 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:13:35 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:53 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:13:53 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:13:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:13:53 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:13:53 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:13:53 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:53 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:53 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': []} - -07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:53 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:53 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:53 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:13:54 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 11:13:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 11:13:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:13:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:13:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:13:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:13:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:13:54 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:13:54 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:54 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:13:54 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall', 'assurance[0].troubleshooting_tools'] - -07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:13:54 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:13:54 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:13:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:05 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:14:05 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:14:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:14:05 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:05 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:06 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:43:38.495913051 +0000 UTC m=+353000.718389890', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:43:38.495076673 +0000 UTC m=+353000.717553513'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:14:06 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:14:06 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:06 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:06 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:06 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:06 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:06 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:14:06 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:14:06 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}]} - -07-26-2024 11:14:07 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:07 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:07 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:07 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:07 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:07 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:07 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:07 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:07 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:07 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:07 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:14:07 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:14:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:14:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:14:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:14:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:10.241467317 +0000 UTC m=+353032.463944155', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:20 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:10.240669107 +0000 UTC m=+353032.463145945'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:14:20 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:14:20 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:20 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:20 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:20 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:20 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:20 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:14:20 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:14:20 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}]} - -07-26-2024 11:14:21 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:21 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:21 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:21 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:21 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: monitoring_settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:21 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 11:14:21 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:21 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2561: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:14:21 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: True - -07-26-2024 11:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:43 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:14:43 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:14:43 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:14:43 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:43 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:24.396244729 +0000 UTC m=+353046.618721568', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 05:44:24.395343714 +0000 UTC m=+353046.617820553'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:44 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:14:44 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:14:44 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:44 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:44 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_and_troubleshooting - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2622: Permission denied at level: monitoring_settings - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:44 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:14:44 DEBUG UserandRole: get_permissions: 2721: Permission check complete. Any denied operations: True - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:44 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:44 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:44 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:14:44 DEBUG UserandRole: update_role: 2452: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:14:45 DEBUG UserandRole: update_role: 2459: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:45 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:14:45 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:14:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:14:45 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 05:44:48.443360719 +0000 UTC m=+353070.665837557', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:14:45 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:14:45 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:14:45 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2868: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 05:44:48.442641359 +0000 UTC m=+353070.665118197'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2869: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2878: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:14:45 WARNING UserandRole: generate_role_payload: 2210: Generate payload for role creation/updation... - -07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2687: Starting permission retrieval for role operation: update - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_analytics - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: data_access - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_analytics - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: advanced_network_settings - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_repository - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_hierarchy - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_profiles - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_settings - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: virtual_network - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: compliance - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: eox - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: image_update - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: inventory_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: license - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_telemetry - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: pnp - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: provision - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: app_hosting - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: bonjour - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: stealthwatch - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: umbrella - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: group-based_policy - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: ip_based_access_control - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: security_advisories - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: security - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: machine_reasoning - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: system - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: system_management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: System.System Management - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: system - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: scheduler - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: event_viewer - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: network_reasoner - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2625: Permission allowed at level: search - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: assurance - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2620: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:45 DEBUG UserandRole: check_permission: 2629: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2647: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: assurance - -07-26-2024 11:14:45 DEBUG UserandRole: get_operations: 2654: Navigated to level: troubleshooting_tools - -07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2718: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:14:45 DEBUG UserandRole: get_permissions: 2724: Permission check complete. Any denied operations: False - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: role_name - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: role_name - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: description - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: description - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2498: Processing list with parent_key: assurance - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2480: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].overall - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2502: Found 'deny' at index: assurance[0] - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: assurance - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_analytics - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_analytics - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_design - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_provision - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: network_services - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: platform - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: platform - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: security - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: security - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: system - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: system - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2487: Checking key: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2493: Found 'deny' at key: utilities - -07-26-2024 11:14:45 DEBUG UserandRole: find_denied_permissions: 2504: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:14:45 DEBUG UserandRole: remove_denied_operations: 2523: Starting removal of denied operations. - -07-26-2024 11:14:45 DEBUG UserandRole: remove_denied_operations: 2569: Removal complete. Update required: False - -07-26-2024 11:14:45 INFO UserandRole: verify_diff_merged: 2886: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:14:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:47:37 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:47:37 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:47:37 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:47:37 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:37 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:37 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:47:38 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:15.489612788 +0000 UTC m=+355017.712089627', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:38 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:38 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 11:47:38 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 11:47:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:38 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:47:38 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:47:38 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:38 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:38 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1518: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 11:47:38 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' - -07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:47:38 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: create - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2636: Permission denied at level: monitoring_and_troubleshooting - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2636: Permission denied at level: monitoring_settings - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:47:38 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:38 DEBUG UserandRole: get_permissions: 2735: Permission check complete. Any denied operations: True - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:47:38 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:38 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:47:38 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False - -07-26-2024 11:47:38 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:39 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 11:47:39 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 11:47:39 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 11:47:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 11:47:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:47:39 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:39 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:47:39 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:47:39 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' - -07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:47:39 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:47:39 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:39 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:47:39 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:39 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:47:39 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False - -07-26-2024 11:47:39 INFO UserandRole: verify_diff_merged: 2900: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:47:55 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:47:55 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:47:55 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:47:55 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:55 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:55 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:55 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:47:56 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:47:56 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:47:56 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:47:56 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:56 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False - -07-26-2024 11:47:56 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 11:47:56 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:47:56 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:47:56 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:47:56 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:47:56 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'deny', 'troubleshooting_tools': 'write'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:47:56 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource overall because permission is 'deny' - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:47:56 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:47:56 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:56 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:47:56 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].overall'] - -07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:47:56 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: False - -07-26-2024 11:47:56 INFO UserandRole: verify_diff_merged: 2900: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 11:47:56 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:48:15 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 11:48:15 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 11:48:15 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 11:48:15 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:15 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:48:16 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:17:42.474864187 +0000 UTC m=+355044.697341025', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:16 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:48:16 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 06:17:42.473954848 +0000 UTC m=+355044.696431690'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:48:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 11:48:16 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 11:48:16 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:16 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:16 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:16 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 11:48:16 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:48:16 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:48:16 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:48:16 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2575: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:48:16 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: True - -07-26-2024 11:48:16 DEBUG UserandRole: update_role: 2466: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:48:17 DEBUG UserandRole: update_role: 2473: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:48:17 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 11:48:17 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:48:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 11:48:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 11:48:17 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:18:20.27349712 +0000 UTC m=+355082.495973958', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 11:48:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 11:48:17 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 11:48:17 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2882: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 06:18:20.272600041 +0000 UTC m=+355082.495076880'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2883: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 11:48:17 INFO UserandRole: verify_diff_merged: 2892: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 11:48:17 WARNING UserandRole: generate_role_payload: 2224: Generate payload for role creation/updation... - -07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:17 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 11:48:17 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2701: Starting permission retrieval for role operation: update - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_analytics - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: data_access - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_analytics - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: advanced_network_settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_repository - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_hierarchy - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_profiles - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: virtual_network - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: compliance - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: eox - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: image_update - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: inventory_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: license - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.License - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_telemetry - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: pnp - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: provision - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: app_hosting - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: bonjour - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: stealthwatch - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: umbrella - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: group-based_policy - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: ip_based_access_control - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: security_advisories - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: security - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: machine_reasoning - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: system - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: system_management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: System.System Management - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: system - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: scheduler - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: event_viewer - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: network_reasoner - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: search - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Utilities.Search - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2639: Permission allowed at level: monitoring_settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2634: Navigated to level: troubleshooting_tools - -07-26-2024 11:48:17 DEBUG UserandRole: check_permission: 2643: Final permission check: Denied: False, Allowed: True - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2661: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: get_operations: 2668: Navigated to level: troubleshooting_tools - -07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2732: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 11:48:17 DEBUG UserandRole: get_permissions: 2738: Permission check complete. Any denied operations: False - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: role_name - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: role_name - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: description - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: description - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2512: Processing list with parent_key: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2494: Processing dictionary with parent_key: assurance[0] - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].overall - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].overall - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at index: assurance[0] - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: assurance - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_analytics - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_analytics - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_design - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_provision - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: network_services - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: platform - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: platform - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: security - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: security - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: system - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: system - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2501: Checking key: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2507: Found 'deny' at key: utilities - -07-26-2024 11:48:17 DEBUG UserandRole: find_denied_permissions: 2518: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2537: Starting removal of denied operations. - -07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2575: Removing resource due to denied type: troubleshooting tools - -07-26-2024 11:48:17 DEBUG UserandRole: remove_denied_operations: 2583: Removal complete. Update required: True - -07-26-2024 11:48:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 12:12:38 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 12:12:38 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 12:12:38 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 12:12:38 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:38 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:38 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:38 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 12:12:39 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:12:39 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:12:39 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 12:12:39 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 12:12:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:39 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 12:12:39 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 12:12:39 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:39 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:12:39 WARNING UserandRole: generate_role_payload: 2223: Starting payload generation for role... - -07-26-2024 12:56:30 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 12:56:30 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 12:56:30 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 12:56:30 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:30 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:30 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 12:56:31 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:56:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:56:31 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 12:56:31 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 12:56:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:31 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 12:56:31 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 12:56:31 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:31 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:56:31 WARNING UserandRole: generate_role_payload: 2223: Starting payload generation for role... - -07-26-2024 12:56:31 WARNING UserandRole: generate_role_payload: 2248: Processing rules using process_assurance_rules... - -07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 12:56:31 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 12:56:31 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 12:58:12 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 12:58:12 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 12:58:12 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 12:58:12 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:12 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 12:58:42 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 12:58:42 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 12:58:42 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 12:58:42 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 12:58:42 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 06:42:36.332028524 +0000 UTC m=+356538.554505365', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:42 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:42 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 12:58:42 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 12:58:42 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 12:58:42 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:42 WARNING UserandRole: generate_role_payload: 2224: Starting payload generation for role... - -07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1518: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:42 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:42 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 12:58:42 DEBUG UserandRole: get_permissions: 2703: Starting permission retrieval for role operation: create - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: troubleshooting_tools - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2645: Final permission check: Denied: False, Allowed: True - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: troubleshooting_tools - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_analytics - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: data_access - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_analytics - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: advanced_network_settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_repository - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_hierarchy - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_profiles - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: virtual_network - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: compliance - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: eox - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_update - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: license - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.License - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:42 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_telemetry - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 12:58:42 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: pnp - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: provision - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: app_hosting - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: bonjour - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: stealthwatch - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: umbrella - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: group-based_policy - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: ip_based_access_control - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: security_advisories - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: system - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: machine_reasoning - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: system - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: system - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: system_management - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.System Management - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: system - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: scheduler - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: event_viewer - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_reasoner - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: search - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Search - -07-26-2024 12:58:43 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: get_permissions: 2734: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 12:58:43 DEBUG UserandRole: get_permissions: 2740: Permission check complete. Any denied operations: False - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: role_name - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: role_name - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: description - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: description - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2514: Processing list with parent_key: assurance - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: assurance[0] - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].overall - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].overall - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2518: Found 'deny' at index: assurance[0] - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_analytics - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_analytics - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_design - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_design - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_provision - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_services - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: platform - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: platform - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: security - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: security - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: system - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: system - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: utilities - -07-26-2024 12:58:43 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2539: Starting removal of denied operations. - -07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2577: Removing resource due to denied type: troubleshooting tools - -07-26-2024 12:58:43 DEBUG UserandRole: remove_denied_operations: 2585: Removal complete. Update required: True - -07-26-2024 12:58:43 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 12:58:43 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 12:58:43 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 12:58:43 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 12:58:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 12:58:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 12:58:44 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 12:58:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 12:58:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 12:58:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2884: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2885: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 12:58:44 INFO UserandRole: verify_diff_merged: 2894: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 12:58:44 WARNING UserandRole: generate_role_payload: 2224: Starting payload generation for role... - -07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1526: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1528: Processing assurance rules. - -07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:44 WARNING UserandRole: add_entries: 1514: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 12:58:44 WARNING UserandRole: process_assurance_rules: 1545: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2703: Starting permission retrieval for role operation: update - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: monitoring_settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_analytics - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: data_access - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_analytics - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: advanced_network_settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_repository - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_hierarchy - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_profiles - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: virtual_network - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: compliance - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: eox - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: image_update - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: inventory_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: license - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.License - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_telemetry - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: pnp - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: provision - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: app_hosting - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: bonjour - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: stealthwatch - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: umbrella - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: group-based_policy - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: ip_based_access_control - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: security_advisories - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: security - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: system - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: machine_reasoning - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: system - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: system - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: system_management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: System.System Management - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: system - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: scheduler - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: event_viewer - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: network_reasoner - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2641: Permission allowed at level: search - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Utilities.Search - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2636: Navigated to level: troubleshooting_tools - -07-26-2024 12:58:44 DEBUG UserandRole: check_permission: 2645: Final permission check: Denied: False, Allowed: True - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2663: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: get_operations: 2670: Navigated to level: troubleshooting_tools - -07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2734: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 12:58:44 DEBUG UserandRole: get_permissions: 2740: Permission check complete. Any denied operations: False - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: role_name - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: role_name - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: description - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: description - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2514: Processing list with parent_key: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2496: Processing dictionary with parent_key: assurance[0] - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].overall - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].overall - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2518: Found 'deny' at index: assurance[0] - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: assurance - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_analytics - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_analytics - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_design - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_provision - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: network_services - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: platform - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: platform - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: security - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: security - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: system - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: system - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2503: Checking key: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2509: Found 'deny' at key: utilities - -07-26-2024 12:58:44 DEBUG UserandRole: find_denied_permissions: 2520: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2539: Starting removal of denied operations. - -07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2577: Removing resource due to denied type: troubleshooting tools - -07-26-2024 12:58:44 DEBUG UserandRole: remove_denied_operations: 2585: Removal complete. Update required: True - -07-26-2024 12:58:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:19:40 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:19:40 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:19:40 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:19:40 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:40 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:40 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:19:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:19:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:19:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:19:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:19:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:41 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:19:41 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:19:41 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_Access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:19:41 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:19:41 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:19:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] - -07-26-2024 13:19:41 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_Access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:19:41 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: data_access - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type - -07-26-2024 13:19:41 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations - -07-26-2024 13:19:41 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations - -07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:19:41 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_Access - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_Access - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:19:41 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:19:41 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:19:41 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:20:11 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:20:11 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:20:11 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:20:11 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:20:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:20:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:20:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:20:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:11 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:11 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] - -07-26-2024 13:20:11 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:20:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:20:11 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:20:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type - -07-26-2024 13:20:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations - -07-26-2024 13:20:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations - -07-26-2024 13:20:12 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:20:12 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:20:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:20:12 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:20:12 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:20:51 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:20:51 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:20:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:20:51 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:20:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:28:47.010832593 +0000 UTC m=+359309.233309431', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:20:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:28:47.010071587 +0000 UTC m=+359309.232548425'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:20:51 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:20:51 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:51 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:51 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] - -07-26-2024 13:20:51 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:20:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:51 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:20:51 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:20:51 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:20:51 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:20:51 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 13:20:52 DEBUG UserandRole: update_role: 2479: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:20:52 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:20:52 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:20:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:20:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:20:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:20:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:20:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:20:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2888: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2889: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:20:53 INFO UserandRole: verify_diff_merged: 2898: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:20:53 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:20:53 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission read to operations ['gRead'] - -07-26-2024 13:20:53 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:53 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:20:53 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:20:53 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:20:53 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:20:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:21:11 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:21:11 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:21:11 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:21:11 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:21:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:50:55.932728508 +0000 UTC m=+360638.155205347', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:21:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:50:55.932056494 +0000 UTC m=+360638.154533333'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:21:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:21:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:11 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:11 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:21:11 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:21:11 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:11 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:21:11 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:21:12 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:12 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:21:12 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:21:12 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:21:12 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:21:12 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:21:12 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 13:21:12 DEBUG UserandRole: update_role: 2479: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:21:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:21:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:21:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:21:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:21:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:21:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:21:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:21:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2888: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2889: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'data_access': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:13 INFO UserandRole: verify_diff_merged: 2898: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:21:13 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:13 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:21:13 WARNING UserandRole: process_network_analytics_rules: 1627: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: data_access - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: data_access - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:21:13 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:21:13 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].data_access - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:21:13 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:21:13 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:21:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:21:59 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:21:59 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:21:59 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:21:59 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:59 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:59 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:59 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:21:59 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:22:00 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:22:00 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:22:00 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:22:00 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:22:00 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:22:00 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:22:00 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:22:00 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:22:00 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:22:00 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:22:00 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:22:00 WARNING UserandRole: process_network_analytics_rules: 1613: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:22:00 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:22:00 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2707: Starting permission retrieval for role operation: update - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: monitoring_settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_analytics - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: data_access - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_analytics - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: advanced_network_settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_repository - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_hierarchy - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_profiles - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: virtual_network - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: compliance - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: eox - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: image_update - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: inventory_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: license - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_telemetry - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: pnp - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: provision - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: app_hosting - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: bonjour - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: stealthwatch - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: umbrella - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: group-based_policy - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: ip_based_access_control - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: security_advisories - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: security - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: machine_reasoning - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: system - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: system_management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: System.System Management - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: system - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: scheduler - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: event_viewer - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: network_reasoner - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: search - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2640: Navigated to level: troubleshooting_tools - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2649: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2674: Navigated to level: troubleshooting_tools - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: type - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: type - -07-26-2024 13:22:00 DEBUG UserandRole: check_permission: 2645: Permission allowed at level: operations - -07-26-2024 13:22:00 DEBUG UserandRole: get_operations: 2667: Retrieving operations for resource type: operations - -07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2738: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:22:00 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: False - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: role_name - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: role_name - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: description - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: description - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].overall - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: assurance[0] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: assurance - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2518: Processing list with parent_key: network_analytics - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2500: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_analytics[0].overall - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2522: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are [] - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_analytics - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_design - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_provision - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: network_services - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: platform - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: platform - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: security - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: security - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: system - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: system - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2507: Checking key: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2513: Found 'deny' at key: utilities - -07-26-2024 13:22:00 DEBUG UserandRole: find_denied_permissions: 2524: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2543: Starting removal of denied operations. - -07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2581: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:22:00 DEBUG UserandRole: remove_denied_operations: 2589: Removal complete. Update required: True - -07-26-2024 13:22:00 DEBUG UserandRole: update_role: 2472: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:25:33 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:25:33 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:25:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:25:33 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:25:33 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:25:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:25:33 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:25:33 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:25:33 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:25:33 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:25:33 WARNING UserandRole: generate_role_payload: 2228: Starting payload generation for role... - -07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:25:33 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:25:33 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:25:33 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:25:33 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:27:48 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:27:48 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:27:48 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:27:48 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:48 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:27:49 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:51:16.061080772 +0000 UTC m=+360658.283557610', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:49 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:27:49 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:51:16.060395389 +0000 UTC m=+360658.282872228'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:27:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:49 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:27:49 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:27:49 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:49 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... - -07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:49 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:27:49 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:27:49 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:27:49 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools - -07-26-2024 13:27:49 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools - -07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:27:49 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities - -07-26-2024 13:27:49 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. - -07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2582: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:27:49 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: True - -07-26-2024 13:27:49 DEBUG UserandRole: update_role: 2473: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}]} - -07-26-2024 13:27:50 DEBUG UserandRole: update_role: 2480: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:27:50 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:27:50 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:27:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:27:50 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:27:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:27:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2889: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2890: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'deny'}], 'network_analytics': None, 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:27:50 INFO UserandRole: verify_diff_merged: 2899: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:27:50 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... - -07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:27:50 WARNING UserandRole: process_assurance_rules: 1544: Skipping resource troubleshooting_tools because permission is 'deny' - -07-26-2024 13:27:50 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:27:50 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools - -07-26-2024 13:27:50 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools - -07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:27:50 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities - -07-26-2024 13:27:50 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are ['assurance[0].troubleshooting_tools'] - -07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. - -07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2582: Removing resource due to denied type: troubleshooting tools - -07-26-2024 13:27:50 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: True - -07-26-2024 13:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:28:16 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:28:16 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:28:16 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:28:16 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:16 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:28:17 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:28:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:28:17 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:28:17 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:28:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:17 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:28:17 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:28:17 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:28:17 WARNING UserandRole: generate_role_payload: 2229: Starting payload generation for role... - -07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1548: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1548: Converted permission read to operations ['gRead'] - -07-26-2024 13:28:17 WARNING UserandRole: process_assurance_rules: 1570: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1592: Processing network analytics rules. - -07-26-2024 13:28:17 WARNING UserandRole: process_network_analytics_rules: 1614: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:28:17 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:28:17 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2708: Starting permission retrieval for role operation: update - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: monitoring_settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_analytics - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: data_access - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_analytics - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: advanced_network_settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_repository - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_hierarchy - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_profiles - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: virtual_network - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: compliance - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: eox - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: image_update - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: inventory_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: license - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_telemetry - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: pnp - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: provision - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: app_hosting - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: bonjour - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: stealthwatch - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: umbrella - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: group-based_policy - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: ip_based_access_control - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: security_advisories - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: security - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: machine_reasoning - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: system - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: system_management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: System.System Management - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: system - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: scheduler - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: event_viewer - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: network_reasoner - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: search - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2641: Navigated to level: troubleshooting_tools - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2650: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2675: Navigated to level: troubleshooting_tools - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: type - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: type - -07-26-2024 13:28:17 DEBUG UserandRole: check_permission: 2646: Permission allowed at level: operations - -07-26-2024 13:28:17 DEBUG UserandRole: get_operations: 2668: Retrieving operations for resource type: operations - -07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2739: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:28:17 DEBUG UserandRole: get_permissions: 2745: Permission check complete. Any denied operations: False - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: role_name - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: role_name - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: description - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: description - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].overall - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: assurance[0] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: assurance - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2519: Processing list with parent_key: network_analytics - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2501: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_analytics[0].overall - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2523: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_analytics - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_design - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_provision - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: network_services - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: platform - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: platform - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: security - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: security - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: system - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: system - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2508: Checking key: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2514: Found 'deny' at key: utilities - -07-26-2024 13:28:17 DEBUG UserandRole: find_denied_permissions: 2525: Denied permissions are [] - -07-26-2024 13:28:17 DEBUG UserandRole: remove_denied_operations: 2544: Starting removal of denied operations. - -07-26-2024 13:28:17 DEBUG UserandRole: remove_denied_operations: 2590: Removal complete. Update required: False - -07-26-2024 13:28:17 DEBUG UserandRole: update_role: 2473: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'type', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'operations', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:37:47 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:37:47 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:37:47 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:37:47 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:37:47 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 07:57:53.46599651 +0000 UTC m=+361055.688473348', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:47 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:37:47 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 07:57:53.465107352 +0000 UTC m=+361055.687584193'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:37:47 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:37:47 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:47 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:37:47 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:37:47 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:37:47 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:37:47 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:37:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:37:48 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:37:48 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:37:48 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:37:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:48 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:37:48 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:37:48 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:37:48 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:37:48 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:37:48 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:37:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:37:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:37:49 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:37:49 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:37:49 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:37:49 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:37:49 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:49 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:37:49 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:37:49 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:37:49 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:37:49 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:37:49 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:37:49 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:37:49 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:37:49 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:37:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:39:40 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:39:40 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:39:40 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:39:40 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:39:40 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:39:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:39:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:39:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:40 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:39:40 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:39:40 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:39:40 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:39:40 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:40 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:39:40 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:39:41 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 13:39:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 13:39:41 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:39:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:39:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:39:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:39:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:39:41 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:39:41 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:39:41 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: data_access - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:39:41 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:39:41 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:39:41 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:39:41 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:39:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:40:46 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:40:46 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:40:46 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:40:46 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:46 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:46 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:46 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:46 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:40:47 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:07:52.045544476 +0000 UTC m=+361654.268021313', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:47 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:47 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:40:47 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:07:52.044623731 +0000 UTC m=+361654.267100570'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:47 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:40:47 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:40:47 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:47 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:47 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:47 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:47 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:40:47 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:47 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:47 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:40:47 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:47 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:40:47 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:40:47 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:48 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:40:48 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:40:48 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:40:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:40:48 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:40:48 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:48 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:48 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:40:48 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:48 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:40:48 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:48 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:48 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:48 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:40:48 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access - -07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:48 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:40:48 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:48 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:40:48 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:40:48 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:40:52 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:40:52 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:40:52 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:40:52 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:52 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:40:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:47.850837792 +0000 UTC m=+361830.073314631', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:40:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:47.849968429 +0000 UTC m=+361830.072445267'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:40:53 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:40:53 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:53 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:53 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:53 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:40:53 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:40:53 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access - -07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:53 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:40:53 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:53 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:40:53 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:40:53 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:54 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:40:54 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:40:54 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:40:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:40:54 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:40:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:40:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:40:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:40:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny'}, {'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:40:54 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:40:54 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:54 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:54 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:40:54 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:40:54 DEBUG UserandRole: check_permission: 2644: Permission denied at level: data_access - -07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:40:54 DEBUG UserandRole: get_permissions: 2743: Permission check complete. Any denied operations: True - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[1] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[1].data_access - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[1].data_access - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[1] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:40:54 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:40:54 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:40:54 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:40:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:41:35 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:41:35 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:41:35 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:41:35 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:35 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:41:36 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:10:53.772516284 +0000 UTC m=+361835.994993123', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:36 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:41:36 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:10:53.771780199 +0000 UTC m=+361835.994257041'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:41:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:36 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:41:36 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:41:36 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:36 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:36 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:41:36 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:41:36 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:41:36 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:41:36 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:41:36 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:41:36 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:41:36 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:36 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:41:36 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:41:36 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:41:37 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:41:37 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:41:37 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:41:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:41:37 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:41:37 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:41:37 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:41:37 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:41:37 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'deny', 'data_access': 'read'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:41:37 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:37 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:41:37 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission read to operations ['gRead'] - -07-26-2024 13:41:37 WARNING UserandRole: process_network_analytics_rules: 1629: Added entry for resource data_access: {'type': 'Network Analytics.Data Access', 'operations': ['gRead']} - -07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:41:37 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:41:37 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:41:37 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:41:37 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 13:41:37 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:41:37 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: False - -07-26-2024 13:41:37 INFO UserandRole: verify_diff_merged: 2908: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}]} - -07-26-2024 13:41:37 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:42:10 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:42:10 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:42:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:42:10 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:10 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:42:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:11:36.42536146 +0000 UTC m=+361878.647838297', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:42:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:11:36.424417469 +0000 UTC m=+361878.646894307'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:42:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:42:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:11 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:42:11 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:11 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 13:42:11 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:42:11 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:42:11 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:11 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:42:11 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access - -07-26-2024 13:42:11 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True - -07-26-2024 13:42:11 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:42:12 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:42:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:42:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:42:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:42:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:42:12 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:12 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:42:12 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:12 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:42:12 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:12 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:42:12 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:12 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:42:12 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:42:12 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:12 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:42:12 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access - -07-26-2024 13:42:12 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True - -07-26-2024 13:42:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:42:25 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 13:42:25 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 13:42:25 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 13:42:25 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:42:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:11.561457071 +0000 UTC m=+361913.783933909', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:42:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:11.560670686 +0000 UTC m=+361913.783147524'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 13:42:25 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 13:42:25 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:25 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:42:25 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:25 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 13:42:25 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:25 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:42:26 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:42:26 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:42:26 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:26 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:42:26 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access - -07-26-2024 13:42:26 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True - -07-26-2024 13:42:26 DEBUG UserandRole: update_role: 2474: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}]} - -07-26-2024 13:42:26 DEBUG UserandRole: update_role: 2481: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:42:27 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 13:42:27 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:42:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 13:42:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 13:42:27 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:12:26.30520355 +0000 UTC m=+361928.527680388', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 13:42:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 13:42:27 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 13:42:27 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2890: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:12:26.301273156 +0000 UTC m=+361928.523749994'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2891: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': None, 'network_provision': None, 'network_services': None, 'platform': None, 'security': None, 'system': None, 'utilities': None} - -07-26-2024 13:42:27 INFO UserandRole: verify_diff_merged: 2900: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 13:42:27 WARNING UserandRole: generate_role_payload: 2230: Starting payload generation for role... - -07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:27 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 13:42:27 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 13:42:27 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2709: Starting permission retrieval for role operation: update - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: monitoring_settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: advanced_network_settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_repository - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_hierarchy - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_profiles - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: virtual_network - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: compliance - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: eox - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: image_update - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: inventory_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: license - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.License - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_telemetry - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: pnp - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: provision - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: app_hosting - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: bonjour - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: stealthwatch - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: umbrella - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: group-based_policy - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Group-Based Policy - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: ip_based_access_control - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: security_advisories - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: security - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: machine_reasoning - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: system - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: system_management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: System.System Management - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: system - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: scheduler - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: event_viewer - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: network_reasoner - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2647: Permission allowed at level: search - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Utilities.Search - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: troubleshooting_tools - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: network_analytics - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2642: Navigated to level: data_access - -07-26-2024 13:42:27 DEBUG UserandRole: check_permission: 2651: Final permission check: Denied: False, Allowed: True - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2669: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: network_analytics - -07-26-2024 13:42:27 DEBUG UserandRole: get_operations: 2676: Navigated to level: data_access - -07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2740: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 13:42:27 DEBUG UserandRole: get_permissions: 2746: Permission check complete. Any denied operations: False - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: role_name - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: role_name - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: description - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: description - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: assurance[0] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].overall - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].overall - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: assurance[0] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are [] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: assurance - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2520: Processing list with parent_key: network_analytics - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2502: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].overall - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_analytics[0].data_access - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2524: Found 'deny' at index: network_analytics[0] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_analytics - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_design - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_provision - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: network_services - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: platform - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: platform - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: security - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: security - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: system - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: system - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2509: Checking key: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2515: Found 'deny' at key: utilities - -07-26-2024 13:42:27 DEBUG UserandRole: find_denied_permissions: 2526: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2545: Starting removal of denied operations. - -07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2583: Removing resource due to denied type: data access - -07-26-2024 13:42:27 DEBUG UserandRole: remove_denied_operations: 2591: Removal complete. Update required: True - -07-26-2024 13:42:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:25:22 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 14:25:22 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 14:25:22 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:25:22 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:22 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:22 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:25:23 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:09.139841789 +0000 UTC m=+364491.362318630', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 14:25:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 14:25:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:23 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:25:23 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 14:25:23 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:23 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:23 WARNING UserandRole: generate_role_payload: 2168: Starting payload generation for role... - -07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:23 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:23 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2647: Starting permission retrieval for role operation: create - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_settings - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: troubleshooting_tools - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: troubleshooting_tools - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_analytics - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: data_access - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_analytics - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: data_access - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: advanced_network_settings - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_repository - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_repository - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_hierarchy - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_profiles - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_settings - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: virtual_network - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: compliance - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: eox - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: eox - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_update - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_update - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: device_configuration - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: discovery - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_device - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: port_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: port_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: topology - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: license - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_telemetry - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: pnp - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: app_hosting - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: bonjour - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: bonjour - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: stealthwatch - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: umbrella - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: platform - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: bundles - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: platform - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: bundles - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: group-based_policy - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: ip_based_access_control - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: ip_based_access_control - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: security_advisories - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: security_advisories - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: machine_reasoning - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: machine_reasoning - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: system_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.System Management - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: system_management - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: event_viewer - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: network_reasoner - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: search - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2582: Permission denied at level: scheduler - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2580: Navigated to level: audit_log - -07-26-2024 14:25:23 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: get_operations: 2614: Navigated to level: audit_log - -07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2678: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:25:23 DEBUG UserandRole: get_permissions: 2681: Permission check complete. Any denied operations: True - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: role_name - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: role_name - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: description - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: description - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: assurance[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_analytics - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].data_access - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].image_repository - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_design[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].eox - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].image_update - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].bonjour - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_services[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: platform - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].bundles - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: platform[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: security - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: security[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].ip_based_access_control - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].security_advisories - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: security[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: system - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: system[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].machine_reasoning - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].system_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].system_management - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: system[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].audit_log - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: utilities[0] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities - -07-26-2024 14:25:23 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2483: Starting removal of denied operations. - -07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: data access - -07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: security advisories - -07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: system management - -07-26-2024 14:25:23 DEBUG UserandRole: remove_denied_operations: 2529: Removal complete. Update required: True - -07-26-2024 14:25:23 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:25:24 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:25:24 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:25:24 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:25:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:25:24 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:25:24 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 08:55:23.642032173 +0000 UTC m=+364505.864509011', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:25:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:25:24 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:25:24 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2828: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 08:55:23.641230885 +0000 UTC m=+364505.863707723'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2829: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:25:24 INFO UserandRole: verify_diff_merged: 2838: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:25:24 WARNING UserandRole: generate_role_payload: 2168: Starting payload generation for role... - -07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:25:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:25:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:25:24 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2647: Starting permission retrieval for role operation: update - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: monitoring_settings - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: troubleshooting_tools - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: troubleshooting_tools - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_design - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_repository - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_design - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_repository - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: compliance - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: eox - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: eox - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: image_update - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: image_update - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: device_configuration - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: discovery - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_device - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: port_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: port_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: topology - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: license - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: network_telemetry - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: pnp - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2585: Permission allowed at level: provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_services - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: bonjour - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_services - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: bonjour - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: platform - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: bundles - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: platform - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: bundles - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: security - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: ip_based_access_control - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: security - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: ip_based_access_control - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: system - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: machine_reasoning - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: system - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: machine_reasoning - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: utilities - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: audit_log - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: utilities - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: audit_log - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: network_analytics - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2580: Navigated to level: data_access - -07-26-2024 14:25:24 DEBUG UserandRole: check_permission: 2589: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2607: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: network_analytics - -07-26-2024 14:25:24 DEBUG UserandRole: get_operations: 2614: Navigated to level: data_access - -07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2678: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:25:24 DEBUG UserandRole: get_permissions: 2684: Permission check complete. Any denied operations: False - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: role_name - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: role_name - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: description - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: description - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: assurance[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: assurance - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_analytics - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_analytics[0].data_access - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_analytics - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_design - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_design[0].image_repository - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_design[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_design - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].eox - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].image_update - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_provision[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are [] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_provision - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: network_services - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: network_services[0].bonjour - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: network_services[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: network_services - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: platform - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: platform[0].bundles - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: platform[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: platform - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: security - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: security[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].ip_based_access_control - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: security[0].security_advisories - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: security[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: security - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: system - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: system[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].machine_reasoning - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: system[0].system_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system[0].system_management - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: system[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: system - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2458: Processing list with parent_key: utilities - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2440: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2447: Checking key: utilities[0].audit_log - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at index: utilities[0] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2453: Found 'deny' at key: utilities - -07-26-2024 14:25:24 DEBUG UserandRole: find_denied_permissions: 2464: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2483: Starting removal of denied operations. - -07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2521: Removing resource due to denied type: data access - -07-26-2024 14:25:24 DEBUG UserandRole: remove_denied_operations: 2529: Removal complete. Update required: True - -07-26-2024 14:25:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:40:39 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 14:40:39 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 14:40:39 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:40:39 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:39 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:40:40 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:27.623318664 +0000 UTC m=+365409.845795502', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 14:40:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 14:40:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:40:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 14:40:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:40 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:40 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... - -07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:40 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:40 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: create - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_analytics - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: data_access - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_analytics - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: data_access - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: advanced_network_settings - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_hierarchy - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_profiles - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_settings - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: virtual_network - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: app_hosting - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: stealthwatch - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: umbrella - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: group-based_policy - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: security_advisories - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: security_advisories - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: system_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.System Management - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: system_management - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: event_viewer - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: network_reasoner - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: search - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2645: Permission denied at level: scheduler - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log - -07-26-2024 14:40:40 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log - -07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:40:40 DEBUG UserandRole: get_permissions: 2744: Permission check complete. Any denied operations: True - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].data_access - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities - -07-26-2024 14:40:40 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. - -07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: data access - -07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: security advisories - -07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: system management - -07-26-2024 14:40:40 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: True - -07-26-2024 14:40:40 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:40:41 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:40:41 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:40:41 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:40:41 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:40:41 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:40:41 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:40:41 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:40:41 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:40:41 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2891: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2892: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'overall': 'write', 'data_access': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:40:41 INFO UserandRole: verify_diff_merged: 2901: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:40:41 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... - -07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1615: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource data_access because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:40:41 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:40:41 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:40:41 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: security - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: system - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: system - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_analytics - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2643: Navigated to level: data_access - -07-26-2024 14:40:41 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_analytics - -07-26-2024 14:40:41 DEBUG UserandRole: get_operations: 2677: Navigated to level: data_access - -07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:40:41 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].data_access - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall - -07-26-2024 14:40:41 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities - -07-26-2024 14:40:42 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].data_access', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. - -07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2584: Removing resource due to denied type: data access - -07-26-2024 14:40:42 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: True - -07-26-2024 14:40:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:43:03 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 14:43:03 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 14:43:03 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:43:03 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:03 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:03 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:03 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:43:04 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:10:40.838942255 +0000 UTC m=+365423.061419094', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:04 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:04 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:43:04 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:10:40.838078431 +0000 UTC m=+365423.060555274'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:43:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:04 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:43:04 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 14:43:04 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:04 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... - -07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:04 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:04 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:43:04 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:04 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:04 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:43:04 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: security - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: system - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: system - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log - -07-26-2024 14:43:04 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities - -07-26-2024 14:43:04 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log - -07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:43:04 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities - -07-26-2024 14:43:04 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:43:04 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. - -07-26-2024 14:43:04 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: False - -07-26-2024 14:43:04 DEBUG UserandRole: update_role: 2475: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:43:05 DEBUG UserandRole: update_role: 2482: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 14:43:05 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 14:43:05 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 14:43:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:43:05 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:43:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2891: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2892: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2901: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:43:05 WARNING UserandRole: generate_role_payload: 2231: Starting payload generation for role... - -07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:05 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:05 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:43:05 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:43:05 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:43:05 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2710: Starting permission retrieval for role operation: update - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: monitoring_settings - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: troubleshooting_tools - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: troubleshooting_tools - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_design - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_repository - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_design - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_repository - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: compliance - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: eox - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: eox - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: image_update - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: image_update - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: device_configuration - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: discovery - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_device - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: port_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: port_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: topology - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: license - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: network_telemetry - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: pnp - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2648: Permission allowed at level: provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: network_services - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: bonjour - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: network_services - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: bonjour - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: platform - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: bundles - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: platform - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: bundles - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: security - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: ip_based_access_control - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: security - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: ip_based_access_control - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: system - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: machine_reasoning - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: system - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: machine_reasoning - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: utilities - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2643: Navigated to level: audit_log - -07-26-2024 14:43:05 DEBUG UserandRole: check_permission: 2652: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2670: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: utilities - -07-26-2024 14:43:05 DEBUG UserandRole: get_operations: 2677: Navigated to level: audit_log - -07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2741: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:43:05 DEBUG UserandRole: get_permissions: 2747: Permission check complete. Any denied operations: False - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: role_name - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: role_name - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: description - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: description - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: assurance[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: assurance - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_analytics - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_analytics[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_analytics - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_design - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_design[0].image_repository - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_design[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_design - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].eox - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].image_update - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_provision[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are [] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_provision - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: network_services - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: network_services[0].bonjour - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: network_services[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: network_services - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: platform - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: platform[0].bundles - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: platform[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: platform - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: security - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: security[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].ip_based_access_control - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: security[0].security_advisories - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: security[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: security - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: system - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: system[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].machine_reasoning - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: system[0].system_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system[0].system_management - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: system[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: system - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2521: Processing list with parent_key: utilities - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2503: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2510: Checking key: utilities[0].audit_log - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2525: Found 'deny' at index: utilities[0] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2516: Found 'deny' at key: utilities - -07-26-2024 14:43:05 DEBUG UserandRole: find_denied_permissions: 2527: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:43:05 DEBUG UserandRole: remove_denied_operations: 2546: Starting removal of denied operations. - -07-26-2024 14:43:05 DEBUG UserandRole: remove_denied_operations: 2592: Removal complete. Update required: False - -07-26-2024 14:43:05 INFO UserandRole: verify_diff_merged: 2909: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:43:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:43:05 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:05 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:43:06 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985052', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985052', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 14:43:06 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:13:04.638501186 +0000 UTC m=+365566.860978025'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:13:04.639143902 +0000 UTC m=+365566.861620741', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:43:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:43:06 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 14:43:06 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:43:06 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 14:43:06 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:06 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:43:06 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config - -07-26-2024 14:43:06 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 14:43:06 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 14:49:23 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 14:49:23 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 14:49:23 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:49:23 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:23 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:24 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:14.800186752 +0000 UTC m=+365937.022663594', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:24 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:24 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 14:49:24 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 14:49:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:24 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:49:24 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 14:49:24 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:24 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:24 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:24 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:24 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:24 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 14:49:24 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: create - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_analytics - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: data_access - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: advanced_network_settings - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_hierarchy - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_profiles - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_settings - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: virtual_network - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: app_hosting - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: stealthwatch - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: umbrella - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: group-based_policy - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: system_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.System Management - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: system_management - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: event_viewer - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: network_reasoner - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: search - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2566: Permission denied at level: scheduler - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log - -07-26-2024 14:49:24 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log - -07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:24 DEBUG UserandRole: get_permissions: 2665: Permission check complete. Any denied operations: True - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].system_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].system_management - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities - -07-26-2024 14:49:24 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. - -07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2505: Removing resource due to denied type: security advisories - -07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2505: Removing resource due to denied type: system management - -07-26-2024 14:49:24 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: True - -07-26-2024 14:49:24 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:25 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:49:25 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 14:49:25 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:49:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 14:49:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:25 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:25 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:25 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:49:25 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2812: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2813: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'deny'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write', 'system_management': 'deny'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:25 INFO UserandRole: verify_diff_merged: 2822: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:25 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:25 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: process_security_rules: 1989: Skipping resource security_advisories because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:25 WARNING UserandRole: process_system_rules: 2062: Skipping resource system_management because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:25 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 14:49:25 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: system - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: system - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log - -07-26-2024 14:49:25 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities - -07-26-2024 14:49:25 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log - -07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:25 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall', 'security[0].security_advisories'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].system_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].system_management - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:49:25 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall', 'system[0].system_management'] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities - -07-26-2024 14:49:26 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'security[0].security_advisories', 'system[0].overall', 'system[0].system_management', 'utilities[0].overall'] - -07-26-2024 14:49:26 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. - -07-26-2024 14:49:26 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False - -07-26-2024 14:49:26 INFO UserandRole: verify_diff_merged: 2830: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:49:26 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:49:26 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:26 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985544', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985544', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 14:49:26 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:26 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 14:49:26 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:49:26 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 14:49:26 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:26 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config - -07-26-2024 14:49:26 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 14:49:26 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 14:49:51 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 14:49:51 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 14:49:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:49:51 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:51 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:25.00038695 +0000 UTC m=+365947.222863807', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:52 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:49:52 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 09:19:24.998538831 +0000 UTC m=+365947.221015668'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:49:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:49:52 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 14:49:52 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:52 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:52 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 14:49:52 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:52 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: system - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: system - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories - -07-26-2024 14:49:52 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:52 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories - -07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:49:52 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities - -07-26-2024 14:49:52 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 14:49:52 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. - -07-26-2024 14:49:52 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False - -07-26-2024 14:49:52 DEBUG UserandRole: update_role: 2396: Update role with role_info_params: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:49:53 DEBUG UserandRole: update_role: 2403: Received API response from update_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 14:49:53 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 14:49:53 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 14:49:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:53 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 14:49:53 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2812: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'last_modified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2813: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2822: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 14:49:53 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 14:49:53 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 14:49:53 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2631: Starting permission retrieval for role operation: update - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: monitoring_settings - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: troubleshooting_tools - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_design - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_repository - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_design - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_repository - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: compliance - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: eox - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: eox - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: image_update - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: image_update - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: device_configuration - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: discovery - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_device - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: port_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: port_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: topology - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: license - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.License - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: network_telemetry - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: pnp - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2569: Permission allowed at level: provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: network_services - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: bonjour - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: network_services - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: bonjour - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: platform - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: bundles - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: platform - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: bundles - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: ip_based_access_control - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: ip_based_access_control - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: system - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: machine_reasoning - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: system - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: machine_reasoning - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: utilities - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: audit_log - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: utilities - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: audit_log - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2564: Navigated to level: security_advisories - -07-26-2024 14:49:53 DEBUG UserandRole: check_permission: 2573: Final permission check: Denied: False, Allowed: True - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2591: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security - -07-26-2024 14:49:53 DEBUG UserandRole: get_operations: 2598: Navigated to level: security_advisories - -07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2662: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:49:53 DEBUG UserandRole: get_permissions: 2668: Permission check complete. Any denied operations: False - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: role_name - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: role_name - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: description - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: description - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: assurance[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: assurance[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: assurance - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_analytics - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_analytics[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_analytics[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_analytics - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_design - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_design[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_design[0].image_repository - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_design[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_design[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_design - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].eox - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].eox - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].image_update - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_provision[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are [] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_provision - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: network_services - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: network_services[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: network_services[0].bonjour - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: network_services[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_services[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: network_services - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: platform - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: platform[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: platform[0].bundles - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform[0].bundles - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: platform[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['platform[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: platform - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: security - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: security[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].ip_based_access_control - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: security[0].security_advisories - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security[0].security_advisories - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: security[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['security[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: security - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: system - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: system[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: system[0].machine_reasoning - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: system[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['system[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: system - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2442: Processing list with parent_key: utilities - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2424: Processing dictionary with parent_key: utilities[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].overall - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2431: Checking key: utilities[0].audit_log - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2446: Found 'deny' at index: utilities[0] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['utilities[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2437: Found 'deny' at key: utilities - -07-26-2024 14:49:53 DEBUG UserandRole: find_denied_permissions: 2448: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 14:49:53 DEBUG UserandRole: remove_denied_operations: 2467: Starting removal of denied operations. - -07-26-2024 14:49:53 DEBUG UserandRole: remove_denied_operations: 2513: Removal complete. Update required: False - -07-26-2024 14:49:53 INFO UserandRole: verify_diff_merged: 2830: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 14:49:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 14:49:53 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:53 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 14:49:53 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985571', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985571', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 14:49:54 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}], 'meta': {'lastModified': '2024-07-26 09:19:52.606433862 +0000 UTC m=+365974.828910701'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:19:52.607309298 +0000 UTC m=+365974.829786136', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 14:49:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 14:49:54 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 14:49:54 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:54 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 14:49:54 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 14:49:54 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:54 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 14:49:54 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config - -07-26-2024 14:49:54 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 14:49:54 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 15:50:10 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 15:50:10 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 15:50:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 15:50:10 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:10 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:50:11 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 09:20:17.130456721 +0000 UTC m=+365999.352933575', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 15:50:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 15:50:11 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 15:50:11 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1517: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1584: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1642: Role operation is 'create'. Adding default network design entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1708: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1844: Role operation is 'create'. Adding default network services entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1961: Role operation is 'create'. Adding default security entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2035: Role operation is 'create'. Adding default system entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:11 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2093: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:11 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 15:50:11 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: create - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_analytics - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: data_access - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: advanced_network_settings - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_hierarchy - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_profiles - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_settings - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: virtual_network - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: app_hosting - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: stealthwatch - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: umbrella - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: group-based_policy - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: system_management - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: event_viewer - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: network_reasoner - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: search - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2591: Permission denied at level: scheduler - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 15:50:11 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 15:50:11 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:11 DEBUG UserandRole: get_permissions: 2690: Permission check complete. Any denied operations: True - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 15:50:11 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 15:50:12 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 15:50:12 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 15:50:12 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 15:50:12 DEBUG UserandRole: create_role: 1442: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:12 DEBUG UserandRole: create_role: 1449: Received API response from create_role: {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 15:50:12 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}} - -07-26-2024 15:50:12 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 15:50:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': 'Test_Role_1', 'message': 'Role Test_Role_1 created successfully.'}}}} - -07-26-2024 15:50:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:50:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 15:50:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:50:13 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 15:50:13 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 15:50:13 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 15:50:13 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 15:50:13 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:13 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 15:50:13 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 15:50:13 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 15:50:13 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 15:50:13 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 15:50:13 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:50:13 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 15:50:13 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:50:13 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985599', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721985599', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 15:50:13 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:50:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:50:13 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 15:50:13 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 15:50:13 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 15:50:13 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin-Role']} - -07-26-2024 15:50:13 WARNING UserandRole: get_diff_merged: 1304: Role ID for Super-Admin-Role not found in current_role_id_config - -07-26-2024 15:50:13 ERROR UserandRole: get_diff_merged: 1327: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 15:50:13 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 15:51:50 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 15:51:50 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 15:51:50 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 15:51:50 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:51:50 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 15:51:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 15:51:50 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 15:51:50 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:50 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:50 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 15:51:50 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:50 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 15:51:50 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 15:51:50 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:50 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 15:51:50 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 15:51:50 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 15:51:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 15:51:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:51:51 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 15:51:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 15:51:51 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 15:51:51 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 15:51:51 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:51 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 15:51:51 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 15:51:51 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 15:51:51 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 15:51:51 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 15:51:51 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:51 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:51:51 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989268', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 15:51:52 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:52 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 15:51:52 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 15:51:52 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 15:51:52 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:52 DEBUG UserandRole: create_user: 1413: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'roleList': ['SUPER-ADMIN']} - -07-26-2024 15:51:52 DEBUG UserandRole: create_user: 1420: Received API response from create_user: {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}} - -07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1317: Task respoonse {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}} - -07-26-2024 15:51:52 INFO UserandRole: get_diff_merged: 1323: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}}}} - -07-26-2024 15:51:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is created successfully'}}}} - -07-26-2024 15:51:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:51:52 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 15:51:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 15:51:53 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989312', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:53 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 15:51:53 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:53 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 15:51:53 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989312', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 15:51:53 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 15:51:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 15:51:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 15:51:53 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 15:51:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 15:51:53 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 15:51:53 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 15:51:53 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 15:51:53 DEBUG UserandRole: create_user: 1413: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': ['6486ce98ff1f0d0c8be622fb']} - -07-26-2024 15:51:53 ERROR UserandRole: get_diff_merged: 1327: Mandatory field not present: An error occurred while creating the user - -07-26-2024 15:51:53 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:10:17 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:10:17 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:10:17 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:10:17 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:17 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:10:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:10:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:10:18 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:10:18 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 16:10:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 16:10:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:18 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 16:10:18 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:10:18 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 16:10:18 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 16:10:18 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 16:10:18 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:10:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:10:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:10:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:10:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:10:18 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:10:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:10:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:19 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:10:19 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 16:10:19 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:10:19 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 16:10:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 16:10:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 16:10:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:10:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 16:10:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 16:10:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 16:10:19 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:10:19 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:10:19 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721989398', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:10:19 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:19 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989398', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:19 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721989398', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:10:19 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:10:19 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:19 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:19 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:19 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:10:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:10:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:10:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990419', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:10:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990419', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:20 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:10:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:20 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:10:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:10:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990420', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:10:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:10:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:10:21 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:10:21 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:10:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:10:21 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:10:21 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:10:21 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:10:21 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:10:21 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:14:18 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:14:18 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:14:18 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:14:18 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:14:18 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:18 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:14:18 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:14:18 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:14:18 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:18 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:18 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:14:18 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:18 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:18 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 16:14:18 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 16:14:18 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:18 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 16:14:19 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:14:19 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:19 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:19 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:14:19 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2837: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2838: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2847: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2171: Starting payload generation for role... - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_assurance_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1525: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1527: Processing assurance rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1549: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1549: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: process_assurance_rules: 1571: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_analytics_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1593: Processing network analytics rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_analytics_rules: 1611: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_design_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1653: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1655: Processing network design rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1673: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1677: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_network_design_rules: 1695: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_provision_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1725: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1727: Processing network provision rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1817: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1793: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: add_entries: 1505: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1757: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_network_provision_rules: 1775: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_network_services_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1853: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1855: Processing network services rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1873: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1877: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: process_network_services_rules: 1893: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_platform_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1903: Processing platform rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1921: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1925: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_platform_rules: 1948: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_security_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1969: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1971: Processing security rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1989: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1993: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 2008: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 1993: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: process_security_rules: 2022: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_system_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2042: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2044: Processing system rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2062: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2066: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:14:19 WARNING UserandRole: process_system_rules: 2080: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2194: Processing with process_utilities_rules... - -07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2107: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2109: Processing utilities rules. - -07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2127: Skipping resource overall because permission is 'deny' - -07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2131: Converted permission read to operations ['gRead'] - -07-26-2024 16:14:19 WARNING UserandRole: process_utilities_rules: 2149: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2205: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:14:19 WARNING UserandRole: generate_role_payload: 2211: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2252: Starting role comparison for updates... - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2288: Calling get_permissions to filter permissions... - -07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2656: Starting permission retrieval for role operation: update - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: monitoring_settings - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: compliance - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: eox - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: eox - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: image_update - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: image_update - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: device_configuration - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: discovery - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_device - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: port_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: port_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: topology - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: license - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: network_telemetry - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: pnp - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2594: Permission allowed at level: provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: platform - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: bundles - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: platform - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: bundles - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: system - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: system - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2589: Navigated to level: audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: check_permission: 2598: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2616: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: get_operations: 2623: Navigated to level: audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2687: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:19 DEBUG UserandRole: get_permissions: 2693: Permission check complete. Any denied operations: False - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2291: Finding denied permissions... - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: role_name - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: role_name - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: description - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: description - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: assurance[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: assurance - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_analytics[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_analytics - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_design[0].image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_design[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_design - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].eox - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].image_update - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_provision[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are [] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_provision - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: network_services[0].bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: network_services[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: network_services - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: platform[0].bundles - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: platform[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: platform - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: security[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: security[0].security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: security[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['security[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: security - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: system[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: system[0].machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: system[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['system[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: system - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2467: Processing list with parent_key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2449: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2456: Checking key: utilities[0].audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2471: Found 'deny' at index: utilities[0] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2462: Found 'deny' at key: utilities - -07-26-2024 16:14:19 DEBUG UserandRole: find_denied_permissions: 2473: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2492: Starting removal of denied operations. - -07-26-2024 16:14:19 DEBUG UserandRole: remove_denied_operations: 2538: Removal complete. Update required: False - -07-26-2024 16:14:19 WARNING UserandRole: role_requires_update: 2299: No updates required for the role. - -07-26-2024 16:14:19 INFO UserandRole: verify_diff_merged: 2855: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:14:19 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:19 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:14:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990459', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990459', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990459', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:14:20 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:14:20 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:14:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:14:20 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:14:20 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:20 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2860: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990660', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN', 'observer': 'OBSERVER'}} - -07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2861: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2870: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:20 WARNING UserandRole: user_requires_update: 2380: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 INFO UserandRole: verify_diff_merged: 2877: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:20 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:14:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:20 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:14:21 DEBUG UserandRole: get_user: 1474: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990660', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:14:21 DEBUG UserandRole: get_role: 1494: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:14:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:14:21 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:14:21 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {}} - -07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:14:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:14:21 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:14:21 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:14:21 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:14:21 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:14:21 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:16:08 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:16:08 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:16:08 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:16:08 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:08 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:08 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:08 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:08 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:16:09 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:16:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:16:10 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:16:10 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2173: Starting payload generation for role... - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_assurance_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1527: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1529: Processing assurance rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1573: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_analytics_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1593: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1595: Processing network analytics rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1613: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_design_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1655: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1657: Processing network design rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1675: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1679: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1697: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_provision_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1727: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1729: Processing network provision rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1819: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1833: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1777: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_services_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1855: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1857: Processing network services rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1875: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1879: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1895: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_platform_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1905: Processing platform rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1923: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1927: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1950: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_security_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1971: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1973: Processing security rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1991: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2010: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2024: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_system_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2044: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2046: Processing system rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2064: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2068: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2082: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_utilities_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2109: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2111: Processing utilities rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2129: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2133: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2151: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2207: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2213: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2254: Starting role comparison for updates... - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2290: Calling get_permissions to filter permissions... - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2658: Starting permission retrieval for role operation: update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_settings - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: compliance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: eox - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: eox - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: device_configuration - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: discovery - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_device - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: port_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: port_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: topology - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: license - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_telemetry - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: pnp - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: platform - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bundles - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: platform - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bundles - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: system - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: system - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2689: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2695: Permission check complete. Any denied operations: False - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2293: Finding denied permissions... - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: role_name - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: role_name - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: description - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: description - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: assurance[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_design[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].eox - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].image_update - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_services[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].bundles - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: platform[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: security[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: security[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: system[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: system[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: utilities[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2494: Starting removal of denied operations. - -07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2540: Removal complete. Update required: False - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2301: No updates required for the role. - -07-26-2024 16:16:10 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:16:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:16:10 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:10 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:10 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:16:10 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2839: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2840: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2849: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2173: Starting payload generation for role... - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_assurance_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1527: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1529: Processing assurance rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1551: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_assurance_rules: 1573: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_analytics_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1593: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1595: Processing network analytics rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_analytics_rules: 1613: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_design_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1655: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1657: Processing network design rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1675: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1679: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_design_rules: 1697: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_provision_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1727: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1729: Processing network provision rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1819: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1795: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1833: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: add_entries: 1507: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1759: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_provision_rules: 1777: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_network_services_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1855: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1857: Processing network services rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1875: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1879: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_network_services_rules: 1895: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_platform_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1905: Processing platform rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1923: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1927: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_platform_rules: 1950: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_security_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1971: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1973: Processing security rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1991: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2010: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 1995: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_security_rules: 2024: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_system_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2044: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2046: Processing system rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2064: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2068: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:16:10 WARNING UserandRole: process_system_rules: 2082: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2196: Processing with process_utilities_rules... - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2109: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2111: Processing utilities rules. - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2129: Skipping resource overall because permission is 'deny' - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2133: Converted permission read to operations ['gRead'] - -07-26-2024 16:16:10 WARNING UserandRole: process_utilities_rules: 2151: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2207: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:16:10 WARNING UserandRole: generate_role_payload: 2213: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2254: Starting role comparison for updates... - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2290: Calling get_permissions to filter permissions... - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2658: Starting permission retrieval for role operation: update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: monitoring_settings - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: compliance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: eox - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: eox - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: image_update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: image_update - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: device_configuration - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: discovery - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_device - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: port_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: port_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: topology - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: license - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: network_telemetry - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: pnp - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2596: Permission allowed at level: provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: platform - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: bundles - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: platform - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: bundles - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: system - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: system - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2591: Navigated to level: audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: check_permission: 2600: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2618: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: get_operations: 2625: Navigated to level: audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2689: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 DEBUG UserandRole: get_permissions: 2695: Permission check complete. Any denied operations: False - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2293: Finding denied permissions... - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: role_name - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: role_name - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: description - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: description - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: assurance[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: assurance - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_analytics[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_analytics - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_design[0].image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_design[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_design - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].eox - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].image_update - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_provision[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are [] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_provision - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: network_services[0].bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: network_services[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: network_services - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: platform[0].bundles - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: platform[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: platform - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: security[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: security[0].security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: security[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['security[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: security - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: system[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: system[0].machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: system[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['system[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: system - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2469: Processing list with parent_key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2451: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2458: Checking key: utilities[0].audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2473: Found 'deny' at index: utilities[0] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2464: Found 'deny' at key: utilities - -07-26-2024 16:16:10 DEBUG UserandRole: find_denied_permissions: 2475: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2494: Starting removal of denied operations. - -07-26-2024 16:16:10 DEBUG UserandRole: remove_denied_operations: 2540: Removal complete. Update required: False - -07-26-2024 16:16:10 WARNING UserandRole: role_requires_update: 2301: No updates required for the role. - -07-26-2024 16:16:10 INFO UserandRole: verify_diff_merged: 2857: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:10 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:16:10 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:10 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:10 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:10 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:16:11 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990661', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:16:11 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:11 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990661', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:11 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990661', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:11 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:16:11 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:16:11 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:11 WARNING UserandRole: user_requires_update: 2382: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:11 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:11 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:16:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:16:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:16:11 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:16:12 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:12 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2862: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990771', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2863: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2872: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:12 WARNING UserandRole: user_requires_update: 2382: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:12 INFO UserandRole: verify_diff_merged: 2879: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:12 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:16:12 DEBUG UserandRole: get_user: 1476: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990771', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:16:12 DEBUG UserandRole: get_role: 1496: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:16:12 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:16:12 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:16:12 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:16:12 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:16:12 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:16:12 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:16:12 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:16:12 ERROR UserandRole: get_diff_merged: 1325: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:16:12 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:22:13 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:22:13 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:22:13 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:22:13 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:13 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:13 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:22:14 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:22:14 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:22:14 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:22:14 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:22:14 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:22:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:22:14 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:14 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:14 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:22:14 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:22:14 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:22:14 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:22:14 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:22:14 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:22:14 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:22:14 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:22:14 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:14 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:22:14 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:14 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:22:15 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721990772', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:22:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:15 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990772', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:15 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721990772', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:15 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:22:15 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:22:15 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:15 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:15 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:15 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:22:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:22:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:22:15 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991135', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:22:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:16 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991135', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:16 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:16 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:16 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:22:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:22:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:22:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:22:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:22:16 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:22:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:22:16 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:22:16 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:22:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:22:16 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:22:16 DEBUG UserandRole: create_user: 1418: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': 'OBSERVER'} - -07-26-2024 16:22:17 ERROR UserandRole: get_diff_merged: 1328: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:22:17 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:24:25 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:24:25 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:24:25 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:24:25 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:25 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:25 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:25 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:26 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:24:26 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:24:26 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:24:26 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:24:26 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:24:26 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:26 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:24:26 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:24:26 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:24:26 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:24:26 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:24:26 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:24:26 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:24:26 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:26 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:26 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:26 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:24:26 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:24:26 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:26 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:24:26 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:26 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:24:26 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:27 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:27 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:24:27 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:24:27 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:24:27 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:24:27 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:24:27 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:27 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:24:27 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:24:27 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:24:27 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:24:27 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:24:27 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:24:27 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:27 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991136', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:24:27 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:27 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:27 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991136', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:27 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991136', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:24:27 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:24:27 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:27 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:27 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:27 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:24:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:24:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:28 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991267', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:24:28 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:28 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991267', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:28 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:28 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:28 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:28 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:28 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:24:28 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:28 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:24:28 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:28 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:24:28 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:24:28 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:24:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:24:28 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:24:28 DEBUG UserandRole: create_user: 1418: Create user with user_info_params: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'roleList': ['OBSERVER']} - -07-26-2024 16:24:29 DEBUG UserandRole: create_user: 1425: Received API response from create_user: {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}} - -07-26-2024 16:24:29 INFO UserandRole: get_diff_merged: 1318: Task respoonse {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}} - -07-26-2024 16:24:29 INFO UserandRole: get_diff_merged: 1324: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}}}} - -07-26-2024 16:24:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is created successfully'}}}} - -07-26-2024 16:24:29 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:24:29 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991268', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991269', 'roleList': ['OBSERVER']}]}} - -07-26-2024 16:24:29 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:24:29 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:24:29 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']} - -07-26-2024 16:24:29 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991269', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2875: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:24:29 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:24:29 INFO UserandRole: verify_diff_merged: 2882: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:24:29 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:14 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:25:14 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:25:14 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:25:14 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:14 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:14 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:25:15 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:25:15 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:25:15 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:25:15 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:25:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:15 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:15 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:15 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:25:15 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:25:15 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:25:15 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:25:15 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:25:15 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:25:15 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:25:15 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:25:15 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:15 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:25:15 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:15 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:15 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:15 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991306', 'roleList': ['OBSERVER']}]}} - -07-26-2024 16:25:16 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:16 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991306', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:16 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991306', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:16 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:25:16 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:25:16 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:16 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:16 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:16 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:25:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:25:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:16 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991316', 'roleList': ['OBSERVER']}]}} - -07-26-2024 16:25:17 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:17 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991316', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2875: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:17 INFO UserandRole: verify_diff_merged: 2882: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:17 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:17 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['OBSERVER']}]}} - -07-26-2024 16:25:17 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:17 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:17 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991317', 'role_list': ['OBSERVER']} - -07-26-2024 16:25:17 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991317', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:17 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:25:17 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:25:17 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2373: Updating role list with new role ID SUPER-ADMIN. - -07-26-2024 16:25:17 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:17 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:17 DEBUG UserandRole: update_user: 2401: Updating user with parameters: {'firstName': 'syed', 'lastName': 'khadeer', 'email': 'syedkhadeer@example.com', 'roleList': ['SUPER-ADMIN'], 'username': 'syedkhadeer', 'userId': '66a38065f335550043731da9'} - -07-26-2024 16:25:18 DEBUG UserandRole: update_user: 2408: Received API response from update_user: {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}} - -07-26-2024 16:25:18 INFO UserandRole: get_diff_merged: 1318: Task respoonse {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}} - -07-26-2024 16:25:18 INFO UserandRole: get_diff_merged: 1324: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}}}} - -07-26-2024 16:25:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a38065f335550043731da9', 'message': 'User is updated successfully'}}}} - -07-26-2024 16:25:18 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:25:18 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991317', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991318', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:25:18 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:25:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:25:18 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:18 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2865: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991318', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'super-admin': 'SUPER-ADMIN'}} - -07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2866: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': ['Super-Admin']} - -07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2875: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:25:18 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:18 INFO UserandRole: verify_diff_merged: 2882: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:25:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:26:05 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:26:05 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:26:05 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:26:05 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:05 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:05 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:26:06 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:26:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:26:06 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:26:06 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:26:06 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:26:06 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:26:06 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:26:06 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:26:06 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:06 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:06 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:26:06 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2842: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2843: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:26:06 INFO UserandRole: verify_diff_merged: 2852: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2176: Starting payload generation for role... - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_assurance_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1530: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1532: Processing assurance rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1554: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_assurance_rules: 1576: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_analytics_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1596: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1598: Processing network analytics rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_analytics_rules: 1616: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_design_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1658: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1660: Processing network design rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1678: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1682: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_design_rules: 1700: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_provision_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1730: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1732: Processing network provision rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1822: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1798: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1836: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: add_entries: 1510: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1762: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_provision_rules: 1780: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_network_services_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1858: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1860: Processing network services rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1878: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1882: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_network_services_rules: 1898: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_platform_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1908: Processing platform rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1926: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1930: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_platform_rules: 1953: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_security_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1974: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1976: Processing security rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1994: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2013: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 1998: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_security_rules: 2027: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_system_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2047: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2049: Processing system rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2067: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2071: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:26:06 WARNING UserandRole: process_system_rules: 2085: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2199: Processing with process_utilities_rules... - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2112: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2114: Processing utilities rules. - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2132: Skipping resource overall because permission is 'deny' - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2136: Converted permission read to operations ['gRead'] - -07-26-2024 16:26:06 WARNING UserandRole: process_utilities_rules: 2154: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2210: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:26:06 WARNING UserandRole: generate_role_payload: 2216: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2257: Starting role comparison for updates... - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2293: Calling get_permissions to filter permissions... - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2661: Starting permission retrieval for role operation: update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: monitoring_settings - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: compliance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: eox - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: eox - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: image_update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: image_update - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: device_configuration - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: discovery - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_device - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: port_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: port_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: topology - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: inventory_management - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: license - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: network_telemetry - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: pnp - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2599: Permission allowed at level: provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: network_services - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bonjour - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: platform - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: bundles - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: platform - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: bundles - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: ip_based_access_control - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: security_advisories - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: system - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: system - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: machine_reasoning - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2594: Navigated to level: audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: check_permission: 2603: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2621: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: utilities - -07-26-2024 16:26:06 DEBUG UserandRole: get_operations: 2628: Navigated to level: audit_log - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2692: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:06 DEBUG UserandRole: get_permissions: 2698: Permission check complete. Any denied operations: False - -07-26-2024 16:26:06 WARNING UserandRole: role_requires_update: 2296: Finding denied permissions... - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: role_name - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: role_name - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: description - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: description - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: assurance[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: assurance - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_analytics[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_analytics - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_design[0].image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_design[0] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_design - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision - -07-26-2024 16:26:06 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].eox - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].image_update - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_provision[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are [] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_provision - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: network_services - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: network_services[0].bonjour - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: network_services[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: network_services - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: platform - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: platform[0].bundles - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: platform[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: platform - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: security - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: security[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].ip_based_access_control - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: security[0].security_advisories - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: security[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['security[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: security - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: system - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: system[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: system[0].machine_reasoning - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: system[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['system[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: system - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2472: Processing list with parent_key: utilities - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2454: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2461: Checking key: utilities[0].audit_log - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2476: Found 'deny' at index: utilities[0] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2467: Found 'deny' at key: utilities - -07-26-2024 16:26:07 DEBUG UserandRole: find_denied_permissions: 2478: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:26:07 DEBUG UserandRole: remove_denied_operations: 2497: Starting removal of denied operations. - -07-26-2024 16:26:07 DEBUG UserandRole: remove_denied_operations: 2543: Removal complete. Update required: False - -07-26-2024 16:26:07 WARNING UserandRole: role_requires_update: 2304: No updates required for the role. - -07-26-2024 16:26:07 INFO UserandRole: verify_diff_merged: 2860: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:26:07 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:26:07 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:26:07 DEBUG UserandRole: get_user: 1479: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991326', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:26:07 DEBUG UserandRole: get_role: 1499: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:26:07 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:26:07 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991326', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:26:07 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991326', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {}} - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:26:07 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:26:07 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:26:07 WARNING UserandRole: user_requires_update: 2379: Role network-admin not found in current_role. Setting role list to empty. - -07-26-2024 16:26:07 WARNING UserandRole: user_requires_update: 2385: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} - -07-26-2024 16:26:07 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} - -07-26-2024 16:26:07 ERROR UserandRole: get_diff_merged: 1328: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:26:07 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:27:50 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:27:50 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:27:50 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:27:50 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:27:50 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:50 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:50 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:27:50 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:27:50 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:27:50 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:50 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:50 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:27:50 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:50 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:27:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:27:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:27:51 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:27:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:27:51 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:27:51 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:27:51 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:27:51 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:27:51 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:27:51 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:27:51 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:27:51 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:27:51 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:51 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:27:52 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991367', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:27:52 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:27:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:27:52 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991367', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:27:52 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991367', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {}} - -07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:52 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:27:52 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:27:52 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['Network-Admin']} - -07-26-2024 16:27:52 WARNING UserandRole: user_requires_update: 2380: Role network-admin not found in current_role. Setting role list to empty. - -07-26-2024 16:27:52 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} - -07-26-2024 16:27:52 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': []} - -07-26-2024 16:27:52 ERROR UserandRole: get_diff_merged: 1329: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:27:52 DEBUG UserandRole: check_return_status: 230: status: failed, msg: The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name - -07-26-2024 16:28:32 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:28:32 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '10.22.40.225', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:28:32 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:28:32 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:32 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:32 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:28:32 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:28:32 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:28:32 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:32 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:32 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:28:32 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:32 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:32 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:28:32 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:28:32 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:28:32 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:28:32 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:28:33 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:28:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:33 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:33 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'} - -07-26-2024 16:28:33 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'last_modified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'role_id': 'Test_Role_1', 'type': 'CustomResource'}, 'role_exists': True} - -07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:28:33 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:28:33 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:28:33 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:33 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:28:33 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:28:33 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:28:33 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:28:33 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:33 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:28:33 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:33 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:33 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:34 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'authSource': 'internal', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991486', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:28:34 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:34 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:34 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991486', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:34 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'auth_source': 'internal', 'passphrase_update_time': '1721991486', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:28:34 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:28:34 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:34 WARNING UserandRole: user_requires_update: 2374: Updating role list with new role ID OBSERVER. - -07-26-2024 16:28:34 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:28:34 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:28:34 DEBUG UserandRole: update_user: 2402: Updating user with parameters: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['OBSERVER'], 'username': 'ajithandrewj', 'userId': '66a378c0f335550043731da6'} - -07-26-2024 16:28:34 DEBUG UserandRole: update_user: 2409: Received API response from update_user: {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}} - -07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}} - -07-26-2024 16:28:34 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}}}} - -07-26-2024 16:28:34 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'userId': '66a378c0f335550043731da6', 'message': 'User is updated successfully'}}}} - -07-26-2024 16:28:34 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:35 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991514', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991514', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:28:35 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']} - -07-26-2024 16:28:35 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'user_id': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'last_name': 'andrew', 'first_name': 'ajith', 'email': 'ajith.andrew@example.com', 'passphrase_update_time': '1721991514', 'role_list': ['OBSERVER']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': 'Ajith@123', 'username': 'ajithandrewj', 'role_list': ['observer']} - -07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2876: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:35 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:28:35 INFO UserandRole: verify_diff_merged: 2883: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['OBSERVER']} - -07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:35 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:35 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:28:35 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:35 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:35 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:35 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:35 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:28:35 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:28:35 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:28:35 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:35 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:35 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:28:35 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:28:35 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:28:36 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'userId': '667b46bef33555004f193386', 'username': 'admin1', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '668e0288f33555004f1934be', 'username': 'admin', 'lastName': '', 'firstName': '', 'email': '', 'authSource': 'internal', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}, {'userId': '66a378c0f335550043731da6', 'username': 'ajithandrewj', 'lastName': 'andrew', 'firstName': 'ajith', 'email': 'ajith.andrew@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['OBSERVER']}, {'userId': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'lastName': 'khadeer', 'firstName': 'syed', 'email': 'syedkhadeer@example.com', 'passphraseUpdateTime': '1721991515', 'roleList': ['SUPER-ADMIN']}]}} - -07-26-2024 16:28:36 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}], 'meta': {'lastModified': '2024-07-26 10:20:12.437816463 +0000 UTC m=+369594.660293303'}, 'name': 'Test_Role_1', 'description': 'Default role creation', 'roleId': 'Test_Role_1', 'type': 'CustomResource'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'SUPER-ADMIN', 'description': 'SUPER-ADMIN-ROLE', 'roleId': 'SUPER-ADMIN', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'OBSERVER', 'description': 'OBSERVER-ROLE', 'roleId': 'OBSERVER', 'type': 'System'}, {'meta': {'created': '2024-06-07 13:55:25.748211987 +0000 UTC m=+61.725995851', 'lastModified': '2024-07-26 10:20:12.438590273 +0000 UTC m=+369594.661067114', 'createdBy': 'maglev@test.com'}, 'name': 'NW-ADMIN', 'description': 'NETWORK-ADMIN-ROLE', 'roleId': 'NW-ADMIN', 'type': 'System'}]}} - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:28:36 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:28:36 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:36 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'syedkhadeer', 'current_user_config': {'user_id': '66a38065f335550043731da9', 'username': 'syedkhadeer', 'last_name': 'khadeer', 'first_name': 'syed', 'email': 'syedkhadeer@example.com', 'passphrase_update_time': '1721991515', 'role_list': ['SUPER-ADMIN']}, 'user_exists': True, 'current_role_id_config': {'observer': 'OBSERVER'}} - -07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'password': 'Syedkhadeer@123', 'username': 'syedkhadeer', 'role_list': None} - -07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2876: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:28:36 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:36 INFO UserandRole: verify_diff_merged: 2883: The update for user syedkhadeer has been successfully verified. The updated info - {'first_name': 'syed', 'last_name': 'khadeer', 'email': 'syedkhadeer@example.com', 'role_list': ['SUPER-ADMIN']} - -07-26-2024 16:28:36 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user syedkhadeer is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:48:27 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:48:27 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:48:27 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:48:27 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:27 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:27 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:27 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:48:28 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:28 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:28 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 16:48:28 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 16:48:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:28 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:48:28 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:48:28 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:28 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:28 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1523: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1648: Role operation is 'create'. Adding default network design entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1714: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1850: Role operation is 'create'. Adding default network services entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1967: Role operation is 'create'. Adding default security entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2041: Role operation is 'create'. Adding default system entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:28 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2099: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:28 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:48:28 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: create - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_analytics - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: data_access - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: advanced_network_settings - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_hierarchy - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_profiles - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_settings - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: virtual_network - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: app_hosting - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: stealthwatch - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: umbrella - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: group-based_policy - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: system_management - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: event_viewer - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_reasoner - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: search - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2597: Permission denied at level: scheduler - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:48:28 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:28 DEBUG UserandRole: get_permissions: 2696: Permission check complete. Any denied operations: True - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:48:28 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:48:28 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:48:28 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:48:28 DEBUG UserandRole: create_role: 1448: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:30 DEBUG UserandRole: create_role: 1455: Received API response from create_role: {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 16:48:30 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 16:48:30 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 16:48:30 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a386054208d74649686254', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 16:48:30 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:48:31 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:31 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:31 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'} - -07-26-2024 16:48:31 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992709452'}, 'role_id': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386054208d74649686253'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:48:31 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:48:31 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:48:31 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:48:31 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:48:31 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': '66a386054208d74649686254', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:31 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:48:31 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:48:31 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:48:31 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:48:31 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:48:31 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386054208d74649686254', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:48:31 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:48:31 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:31 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:31 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:31 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:48:31 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}, {'firstName': 'ajith', 'lastName': 'andrew', 'authSource': 'internal', 'passphraseUpdateTime': '1721903101770', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}]}} - -07-26-2024 16:48:32 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:32 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:32 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'} - -07-26-2024 16:48:32 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} - -07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:32 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:48:32 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:48:32 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:32 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} - -07-26-2024 16:48:32 WARNING UserandRole: get_diff_merged: 1265: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} - -07-26-2024 16:48:32 INFO UserandRole: get_diff_merged: 1269: User does not need any update - -07-26-2024 16:48:32 DEBUG UserandRole: check_return_status: 230: status: success, msg: User does not need any update - -07-26-2024 16:48:32 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:48:32 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}, {'firstName': 'ajith', 'lastName': 'andrew', 'authSource': 'internal', 'passphraseUpdateTime': '1721903101770', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}]}} - -07-26-2024 16:48:33 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992709452'}, 'roleId': '66a386054208d74649686254', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386054208d74649686253'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:48:33 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:48:33 DEBUG UserandRole: get_have: 1194: Current user config details (have): {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'} - -07-26-2024 16:48:33 INFO UserandRole: get_have: 1198: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} - -07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2866: Current State (have): {'username': 'ajithandrewj', 'current_user_config': {'first_name': 'ajith', 'last_name': 'andrew', 'auth_source': 'internal', 'passphrase_update_time': '1721903101770', 'role_list': ['6486ce97ff1f0d0c8be622f6'], 'user_id': '66a227fdf2d6bb11c6b1c386', 'email': 'ajith.andrew@example.com', 'username': 'ajithandrewj'}, 'user_exists': True, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} - -07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2867: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2876: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:48:33 WARNING UserandRole: user_requires_update: 2386: User update parameters: {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} - -07-26-2024 16:48:33 INFO UserandRole: verify_diff_merged: 2883: The update for user ajithandrewj has been successfully verified. The updated info - {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'role_list': ['6486ce97ff1f0d0c8be622f6']} - -07-26-2024 16:48:33 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested user ajithandrewj is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:49:12 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:49:12 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:49:12 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:49:12 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:12 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:12 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:49:13 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:13 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:13 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 16:49:13 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 16:49:13 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:13 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:49:14 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:49:14 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:14 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:14 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1523: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1590: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1648: Role operation is 'create'. Adding default network design entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1714: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1850: Role operation is 'create'. Adding default network services entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1967: Role operation is 'create'. Adding default security entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2041: Role operation is 'create'. Adding default system entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:14 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2099: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:14 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:49:14 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.System Management', 'operations': ['gRead']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: create - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_analytics - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: data_access - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: advanced_network_settings - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_hierarchy - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_profiles - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_settings - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: virtual_network - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: app_hosting - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: stealthwatch - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: umbrella - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: group-based_policy - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: system_management - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: event_viewer - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: network_reasoner - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: search - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2597: Permission denied at level: scheduler - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:49:14 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:14 DEBUG UserandRole: get_permissions: 2696: Permission check complete. Any denied operations: True - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:49:14 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:49:14 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:49:14 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:49:14 DEBUG UserandRole: create_role: 1448: Create role with role_info_params: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:16 DEBUG UserandRole: create_role: 1455: Received API response from create_role: {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 16:49:16 INFO UserandRole: get_diff_merged: 1319: Task respoonse {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 16:49:16 INFO UserandRole: get_diff_merged: 1325: {'operation': {'response': {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 16:49:16 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a386324208d746496862bf', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 16:49:16 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:49:16 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:16 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:16 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} - -07-26-2024 16:49:16 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2843: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2844: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:49:16 INFO UserandRole: verify_diff_merged: 2853: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2177: Starting payload generation for role... - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_assurance_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1531: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1533: Processing assurance rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1555: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1555: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: process_assurance_rules: 1577: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_analytics_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1597: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1599: Processing network analytics rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_analytics_rules: 1617: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_design_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1659: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1661: Processing network design rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1679: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1683: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_network_design_rules: 1701: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_provision_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1731: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1733: Processing network provision rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1823: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1799: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1837: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: add_entries: 1511: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1763: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_network_provision_rules: 1781: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_network_services_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1859: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1861: Processing network services rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1879: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1883: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: process_network_services_rules: 1899: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_platform_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1909: Processing platform rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1927: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1931: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_platform_rules: 1954: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_security_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1975: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1977: Processing security rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1995: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1999: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 2014: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 1999: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: process_security_rules: 2028: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_system_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2048: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2050: Processing system rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2068: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2072: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:49:16 WARNING UserandRole: process_system_rules: 2086: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2200: Processing with process_utilities_rules... - -07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2113: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2115: Processing utilities rules. - -07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2133: Skipping resource overall because permission is 'deny' - -07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2137: Converted permission read to operations ['gRead'] - -07-26-2024 16:49:16 WARNING UserandRole: process_utilities_rules: 2155: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2211: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:49:16 WARNING UserandRole: generate_role_payload: 2217: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:16 WARNING UserandRole: role_requires_update: 2258: Starting role comparison for updates... - -07-26-2024 16:49:16 WARNING UserandRole: role_requires_update: 2294: Calling get_permissions to filter permissions... - -07-26-2024 16:49:16 DEBUG UserandRole: get_permissions: 2662: Starting permission retrieval for role operation: update - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: monitoring_settings - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: troubleshooting_tools - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: assurance - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: troubleshooting_tools - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_design - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_repository - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_design - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_repository - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: compliance - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: eox - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:16 DEBUG UserandRole: get_operations: 2629: Navigated to level: eox - -07-26-2024 16:49:16 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: image_update - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: image_update - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: device_configuration - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: discovery - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_device - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: port_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: port_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: topology - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: license - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: network_telemetry - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: pnp - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2600: Permission allowed at level: provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: network_services - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: bonjour - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: network_services - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: bonjour - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: platform - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: bundles - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: platform - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: bundles - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: ip_based_access_control - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: ip_based_access_control - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: security_advisories - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: security_advisories - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: system - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: machine_reasoning - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: system - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: machine_reasoning - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: utilities - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2595: Navigated to level: audit_log - -07-26-2024 16:49:17 DEBUG UserandRole: check_permission: 2604: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2622: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: utilities - -07-26-2024 16:49:17 DEBUG UserandRole: get_operations: 2629: Navigated to level: audit_log - -07-26-2024 16:49:17 DEBUG UserandRole: get_permissions: 2693: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:17 DEBUG UserandRole: get_permissions: 2699: Permission check complete. Any denied operations: False - -07-26-2024 16:49:17 WARNING UserandRole: role_requires_update: 2297: Finding denied permissions... - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: role_name - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: role_name - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: description - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: description - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: assurance - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: assurance[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: assurance - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_analytics - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_analytics[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_analytics - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_design - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_design[0].image_repository - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_design[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_design - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].eox - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].image_update - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_provision[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are [] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_provision - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: network_services - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: network_services[0].bonjour - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: network_services[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: network_services - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: platform - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: platform[0].bundles - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: platform[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: platform - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: security - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: security[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].ip_based_access_control - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: security[0].security_advisories - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: security[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['security[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: security - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: system - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: system[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: system[0].machine_reasoning - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: system[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['system[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: system - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2473: Processing list with parent_key: utilities - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2455: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2462: Checking key: utilities[0].audit_log - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2477: Found 'deny' at index: utilities[0] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2468: Found 'deny' at key: utilities - -07-26-2024 16:49:17 DEBUG UserandRole: find_denied_permissions: 2479: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:49:17 DEBUG UserandRole: remove_denied_operations: 2498: Starting removal of denied operations. - -07-26-2024 16:49:17 DEBUG UserandRole: remove_denied_operations: 2544: Removal complete. Update required: False - -07-26-2024 16:49:17 WARNING UserandRole: role_requires_update: 2305: No updates required for the role. - -07-26-2024 16:49:17 INFO UserandRole: verify_diff_merged: 2861: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:49:17 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:49:17 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:17 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:17 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:17 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:49:17 DEBUG UserandRole: get_user: 1480: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}]}} - -07-26-2024 16:49:17 DEBUG UserandRole: get_role: 1500: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:49:17 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:17 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:49:18 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:49:18 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:49:18 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} - -07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:18 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:49:18 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:49:18 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:18 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:49:18 DEBUG UserandRole: create_user: 1419: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['6486ce98ff1f0d0c8be622fb']} - -07-26-2024 16:49:18 ERROR UserandRole: get_diff_merged: 1329: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:49:18 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:59:49 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 16:59:49 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 16:59:49 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:59:49 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:49 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:49 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:49 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:59:51 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:51 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:51 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} - -07-26-2024 16:59:51 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:59:51 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 16:59:51 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_analytics_rules: 1618: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1880: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1928: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2000: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: process_security_rules: 2029: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2069: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:51 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:51 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:59:51 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2295: Calling get_permissions to filter permissions... - -07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: update - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_settings - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: compliance - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: device_configuration - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: discovery - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_device - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: topology - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: license - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_telemetry - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: pnp - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: system - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: system - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log - -07-26-2024 16:59:51 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 16:59:51 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log - -07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:51 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: False - -07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2298: Finding denied permissions... - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities - -07-26-2024 16:59:51 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:59:51 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. - -07-26-2024 16:59:51 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: False - -07-26-2024 16:59:51 WARNING UserandRole: role_requires_update: 2306: No updates required for the role. - -07-26-2024 16:59:51 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 16:59:51 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 16:59:51 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:59:52 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:52 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:52 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'} - -07-26-2024 16:59:52 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2844: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'created_by': 'admin', 'created': '1721992754835'}, 'role_id': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'role_permission_id_list': ['66a386324208d746496862be'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2845: Desired State (want): {'role_name': 'Test_Role_1', 'description': 'Default role creation', 'assurance': [{'overall': 'read', 'troubleshooting_tools': 'write'}], 'network_analytics': [{'overall': 'deny'}], 'network_design': [{'overall': 'deny', 'image_repository': 'read'}], 'network_provision': [{'overall': 'read', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'port_management': 'read'}]}], 'network_services': [{'overall': 'deny', 'bonjour': 'Write'}], 'platform': [{'overall': 'deny', 'bundles': 'read'}], 'security': [{'overall': 'deny', 'ip_based_access_control': 'read', 'security_advisories': 'write'}], 'system': [{'overall': 'deny', 'machine_reasoning': 'write'}], 'utilities': [{'overall': 'deny', 'audit_log': 'read'}]} - -07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2854: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_analytics_rules: 1618: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1880: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1928: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2000: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: process_security_rules: 2029: Added entry for resource security_advisories: {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2069: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 16:59:52 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 16:59:52 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}] - -07-26-2024 16:59:52 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2295: Calling get_permissions to filter permissions... - -07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: update - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_and_troubleshooting - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: monitoring_settings - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: compliance - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: device_configuration - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: discovery - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_device - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: topology - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: license - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: network_telemetry - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: pnp - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2601: Permission allowed at level: provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: system - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: system - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log - -07-26-2024 16:59:52 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 16:59:52 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log - -07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:52 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: False - -07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2298: Finding denied permissions... - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_services[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['platform[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['system[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['utilities[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities - -07-26-2024 16:59:52 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_analytics[0].overall', 'network_design[0].overall', 'network_services[0].overall', 'platform[0].overall', 'security[0].overall', 'system[0].overall', 'utilities[0].overall'] - -07-26-2024 16:59:52 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. - -07-26-2024 16:59:52 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: False - -07-26-2024 16:59:52 WARNING UserandRole: role_requires_update: 2306: No updates required for the role. - -07-26-2024 16:59:52 INFO UserandRole: verify_diff_merged: 2862: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a386324208d746496862bf', 'description': 'Default role creation', 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}]} - -07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 16:59:52 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 16:59:52 INFO UserandRole: validate_input_yml: 941: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:52 INFO UserandRole: get_want: 1148: Desired State (want): {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:52 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:52 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 16:59:52 DEBUG UserandRole: get_user: 1481: Received API response from get_users_api: {'response': {'users': [{'lastName': 'admin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668555', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '6486ce98ff1f0d0c8be622f7', 'username': 'admin'}, {'firstName': 'sysadmin', 'lastName': 'sysadmin_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668583', 'roleList': ['6486ce97ff1f0d0c8be622f6'], 'userId': '66156a13de0e3c3024e06781', 'username': 'sysadmin'}, {'firstName': 'observer', 'lastName': 'observeruser_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668652', 'roleList': ['6486ce98ff1f0d0c8be622fb'], 'userId': '66156a13de0e3c3024e06782', 'username': 'observeruser'}, {'firstName': 'admin2', 'lastName': 'admin2_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668678', 'roleList': ['6486ce98ff1f0d0c8be622f9'], 'userId': '66156a13de0e3c3024e06783', 'username': 'admin2'}, {'firstName': 'assurance_user', 'lastName': 'assurance_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668704', 'roleList': ['66156a04de0e3c3024e060b7'], 'userId': '66156a14de0e3c3024e06784', 'username': 'assurance'}, {'firstName': 'design_user', 'lastName': 'design_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668730', 'roleList': ['66156a05de0e3c3024e0618f'], 'userId': '66156a14de0e3c3024e06785', 'username': 'design'}, {'firstName': 'provision_user', 'lastName': 'provision_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668830', 'roleList': ['66156a07de0e3c3024e06267'], 'userId': '66156a14de0e3c3024e06786', 'username': 'provision'}, {'firstName': 'services_user', 'lastName': 'services_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759668929', 'roleList': ['66156a09de0e3c3024e0633f'], 'userId': '66156a14de0e3c3024e06787', 'username': 'services'}, {'firstName': 'platform_user', 'lastName': 'platform_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669029', 'roleList': ['66156a0ade0e3c3024e06423'], 'userId': '66156a14de0e3c3024e06788', 'username': 'platform'}, {'firstName': 'security_user', 'lastName': 'security_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759669130', 'roleList': ['66156a0cde0e3c3024e064fb'], 'userId': '66156a14de0e3c3024e06789', 'username': 'security'}, {'firstName': 'system_user', 'lastName': 'system_new', 'authSource': 'internal', 'passphraseUpdateTime': '1712759729251', 'roleList': ['66156a0dde0e3c3024e065d3'], 'userId': '66156a15de0e3c3024e0678a', 'username': 'system'}, {'firstName': 'utilities_user', 'authSource': 'internal', 'passphraseUpdateTime': '1712679445330', 'roleList': ['66156a0ede0e3c3024e066ab'], 'userId': '66156a15de0e3c3024e0678b', 'username': 'utilities'}, {'firstName': 'Mohamed', 'lastName': 'Rafeek', 'authSource': 'internal', 'passphraseUpdateTime': '1717390280771', 'roleList': ['665d4b9be9362d2d635a0ea3'], 'userId': '665d49bbe9362d2d635a0dc8', 'email': 'mabdulk2@cisco.com', 'username': 'mabdulk2'}]}} - -07-26-2024 16:59:53 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}], 'meta': {'createdBy': 'admin', 'created': '1721992754835'}, 'roleId': '66a386324208d746496862bf', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'Default role creation', 'rolePermissionIdList': ['66a386324208d746496862be'], 'type': 'CUSTOM'}]}} - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: firstName will be deprecated soon. Please use first_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastName will be deprecated soon. Please use last_name. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: authSource will be deprecated soon. Please use auth_source. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: passphraseUpdateTime will be deprecated soon. Please use passphrase_update_time. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleList will be deprecated soon. Please use role_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: userId will be deprecated soon. Please use user_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 16:59:53 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 16:59:53 DEBUG UserandRole: get_have: 1194: Current user config details (have): {} - -07-26-2024 16:59:53 INFO UserandRole: get_have: 1198: Current State (have): {'user_exists': False, 'current_role_id_config': {'observer-role': '6486ce98ff1f0d0c8be622fb'}} - -07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:53 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 16:59:53 INFO UserandRole: valid_user_config_parameters: 1089: Validating user configuration parameters... - -07-26-2024 16:59:53 INFO UserandRole: valid_user_config_parameters: 1125: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params:{'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:53 INFO UserandRole: get_diff_merged: 1288: Creating user with config {'first_name': 'ajith', 'last_name': 'andrew', 'email': 'ajith.andrew@example.com', 'password': None, 'username': None, 'role_list': None} - -07-26-2024 16:59:53 WARNING UserandRole: get_diff_merged: 1312: Point - -07-26-2024 16:59:53 DEBUG UserandRole: create_user: 1420: Create user with user_info_params: {'firstName': 'ajith', 'lastName': 'andrew', 'email': 'ajith.andrew@example.com', 'roleList': ['6486ce98ff1f0d0c8be622fb']} - -07-26-2024 16:59:53 ERROR UserandRole: get_diff_merged: 1330: Mandatory field not present: An error occurred while creating the user - -07-26-2024 16:59:53 DEBUG UserandRole: check_return_status: 230: status: failed, msg: Mandatory field not present: An error occurred while creating the user - -07-26-2024 17:17:04 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:17:04 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:17:04 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:17:04 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:04 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:04 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:04 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:17:05 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:05 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:05 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 17:17:05 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 17:17:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:05 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:17:05 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:17:05 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:05 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:05 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:17:05 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:05 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:17:06 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:17:06 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2663: Starting permission retrieval for role operation: create - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: monitoring_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: monitoring_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: troubleshooting_tools - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: troubleshooting_tools - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_analytics - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: data_access - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_analytics - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: data_access - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: advanced_network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: advanced_network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_repository - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_repository - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_hierarchy - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_hierarchy - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_profiles - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_profiles - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: virtual_network - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: virtual_network - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: compliance - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: compliance - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: eox - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: eox - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: image_update - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: image_update - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: device_configuration - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: device_configuration - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: discovery - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: discovery - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_device - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_device - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: port_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: port_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: topology - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: topology - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: license - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: license - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_telemetry - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_telemetry - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: pnp - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: pnp - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: provision - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: app_hosting - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: app_hosting - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: bonjour - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: bonjour - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: stealthwatch - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: stealthwatch - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: umbrella - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: umbrella - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: apis - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: apis - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: bundles - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: bundles - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: events - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: events - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: reports - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: platform - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: reports - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2598: Permission denied at level: group-based_policy - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: ip_based_access_control - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: ip_based_access_control - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: security_advisories - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: security_advisories - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: machine_reasoning - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: machine_reasoning - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: system_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: System.System Management - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: system_management - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: event_viewer - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: event_viewer - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: network_reasoner - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: network_reasoner - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: search - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: search - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: scheduler - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: scheduler - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: audit_log - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: audit_log - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2596: Navigated to level: remote_device_support - -07-26-2024 17:17:06 DEBUG UserandRole: check_permission: 2605: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2623: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: get_operations: 2630: Navigated to level: remote_device_support - -07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2694: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:17:06 DEBUG UserandRole: get_permissions: 2697: Permission check complete. Any denied operations: True - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: role_name - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: role_name - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: description - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: description - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: assurance[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: assurance - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_analytics - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_analytics[0].data_access - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_analytics - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].image_repository - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_profiles - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_design[0].virtual_network - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_design[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_design - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].compliance - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].eox - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].image_update - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].license - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].pnp - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_provision[0].provision - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_provision[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_provision - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].app_hosting - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].bonjour - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].stealthwatch - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: network_services[0].umbrella - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: network_services[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: network_services - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: platform - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].apis - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].apis - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].bundles - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].events - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].events - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: platform[0].reports - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform[0].reports - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: platform[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: platform - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: security - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: security[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].group_based_policy - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].ip_based_access_control - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: security[0].security_advisories - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: security[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: security - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: system - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: system[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].machine_reasoning - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: system[0].system_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system[0].system_management - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: system[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: system - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2474: Processing list with parent_key: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2456: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].audit_log - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].event_viewer - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].network_reasoner - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].remote_device_support - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].scheduler - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2463: Checking key: utilities[0].search - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities[0].search - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2478: Found 'deny' at index: utilities[0] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are [] - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2469: Found 'deny' at key: utilities - -07-26-2024 17:17:06 DEBUG UserandRole: find_denied_permissions: 2480: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2499: Starting removal of denied operations. - -07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2514: Removing resource due to denied type: network design.network settings - -07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2522: Removing resource due to denied type: network provision.provision - -07-26-2024 17:17:06 DEBUG UserandRole: remove_denied_operations: 2545: Removal complete. Update required: True - -07-26-2024 17:17:06 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:17:07 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:17:07 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:17:07 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:17:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a38cba4208d7464968632e', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:17:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:17:08 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:17:08 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:17:08 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} - -07-26-2024 17:17:08 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2844: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2845: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:17:08 INFO UserandRole: verify_diff_merged: 2854: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:17:08 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:17:08 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:17:08 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:21:53 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:21:53 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:21:53 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:21:53 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:53 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:53 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:53 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:21:54 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:21:54 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:21:54 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} - -07-26-2024 17:21:54 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:21:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:54 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:21:54 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:21:54 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:54 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:21:54 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:21:54 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:21:54 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:21:54 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:22:21 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:22:21 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:22:21 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:22:21 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:21 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:22:22 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721994426935'}, 'roleId': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:22:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:22:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'} - -07-26-2024 17:22:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721994426935'}, 'role_id': '66a38cba4208d7464968632e', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38cba4208d7464968632d'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:22:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:22 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:22:22 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:22:22 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:22:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:22:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:22:23 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:22:23 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:22:23 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:22:23 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:22:23 WARNING UserandRole: role_requires_update: 2286: point - -07-26-2024 17:29:07 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:29:07 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:29:07 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:29:07 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:07 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:07 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:07 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:29:09 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:09 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:09 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 17:29:09 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 17:29:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:09 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:29:09 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:29:09 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:09 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:09 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:09 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:29:09 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:29:09 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:09 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:29:09 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings - -07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision - -07-26-2024 17:29:09 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True - -07-26-2024 17:29:09 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:11 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:29:11 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:29:11 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:29:11 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a38f8e4208d746496863dd', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:29:11 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:29:11 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:11 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:11 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} - -07-26-2024 17:29:11 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:11 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:11 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:29:11 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:12 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:29:12 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:29:12 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:12 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:29:12 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:12 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:29:12 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:29:12 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:29:12 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:12 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:29:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:29:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:29:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:29:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:29:20 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:20 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} - -07-26-2024 17:29:20 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:29:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:20 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:29:20 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:29:20 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:20 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:20 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:29:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:21 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:29:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:21 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:29:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:29:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:29:21 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:29:21 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 17:29:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 17:29:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:29:21 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995150190'}, 'roleId': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:29:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:29:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:29:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'} - -07-26-2024 17:29:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995150190'}, 'role_id': '66a38f8e4208d746496863dd', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a38f8e4208d746496863dc'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:29:22 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:29:22 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:29:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:22 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:29:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:29:22 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:29:22 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:29:22 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:29:22 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a38f8e4208d746496863dd', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:29:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:31:42 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:31:42 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:31:42 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:31:42 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:42 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:42 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:42 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:31:43 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:43 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:43 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 17:31:43 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 17:31:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:43 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:31:43 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:31:43 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:43 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:43 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:31:43 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2601: Permission denied at level: compliance - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:31:43 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:43 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:43 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True - -07-26-2024 17:31:43 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:31:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings - -07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision - -07-26-2024 17:31:44 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True - -07-26-2024 17:31:44 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:45 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:31:45 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:31:45 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:31:45 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a390284208d7464968648a', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:31:45 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:31:46 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:31:46 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:31:46 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} - -07-26-2024 17:31:46 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:31:46 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:31:46 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:31:46 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:31:46 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:31:46 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:46 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:31:46 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:31:46 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:31:47 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:31:47 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:31:47 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:31:47 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:31:47 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:31:47 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:34:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:34:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:34:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:34:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:34:21 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} - -07-26-2024 17:34:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:34:21 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:34:21 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:34:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:34:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:21 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:34:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:34:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:34:21 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:34:21 INFO UserandRole: get_diff_merged: 1233: Role does not need any update - -07-26-2024 17:34:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Role does not need any update - -07-26-2024 17:34:21 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:34:22 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:34:22 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:34:22 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} - -07-26-2024 17:34:22 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'write', 'audit_log': 'read', 'event_viewer': 'read', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Audit Log', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource event_viewer: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:34:22 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:34:22 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:34:22 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:22 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:34:22 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:34:22 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:34:22 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:34:22 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:34:22 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:34:22 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:41:39 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:41:39 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:41:39 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:41:39 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:39 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:39 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:39 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:41:40 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735'}, 'roleId': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a390284208d74649686489'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:40 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:40 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'} - -07-26-2024 17:41:40 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735'}, 'role_id': '66a390284208d7464968648a', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a390284208d74649686489'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:41:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:40 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:41:40 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:41:40 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:40 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:40 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:41:40 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:40 INFO UserandRole: get_diff_merged: 1226: desired role with config {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:41:40 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:40 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:40 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:41:40 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:41:40 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:41:41 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2540: Removing resource due to denied type: event viewer - -07-26-2024 17:41:41 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True - -07-26-2024 17:41:41 WARNING UserandRole: role_requires_update: 2306: Role update required. Changes detected. - -07-26-2024 17:41:41 DEBUG UserandRole: update_role: 2431: Update role with role_info_params: {'roleId': '66a390284208d7464968648a', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:43 DEBUG UserandRole: update_role: 2438: Received API response from update_role: {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 17:41:43 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}} - -07-26-2024 17:41:43 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 17:41:43 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a3927e4208d74649686538', 'message': 'Role Test_Role_1 is updated successfully.'}}}} - -07-26-2024 17:41:43 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:41:44 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995304735', 'lastModified': '1721995903784'}, 'roleId': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:41:44 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:41:44 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'} - -07-26-2024 17:41:44 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995304735', 'last_modified': '1721995903784'}, 'role_id': '66a3927e4208d74649686538', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a3927e4208d74649686537'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:41:44 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:41:44 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:41:44 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a3927e4208d74649686538', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:44 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:41:44 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:41:44 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:41:44 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:41:44 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:41:44 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a3927e4208d74649686538', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:41:44 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:42:19 DEBUG UserandRole: __init__: 80: Logging configured and initiated - -07-26-2024 17:42:19 DEBUG UserandRole: __init__: 86: Cisco Catalyst Center parameters: {'dnac_host': '172.23.241.186', 'dnac_port': '443', 'dnac_username': 'admin', 'dnac_password': 'Maglev123', 'dnac_verify': False, 'dnac_debug': True, 'dnac_log': True, 'dnac_log_level': 'DEBUG', 'dnac_log_file_path': 'dnac.log', 'dnac_log_append': True} - -07-26-2024 17:42:19 INFO UserandRole: validate_input_yml: 885: Validating the Playbook Yaml File.. - -07-26-2024 17:42:19 INFO UserandRole: validate_input_yml: 917: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:19 INFO UserandRole: get_want: 1148: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:19 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:19 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:42:20 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:20 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:21 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:21 DEBUG UserandRole: get_have: 1189: Current role config details (have): {} - -07-26-2024 17:42:21 INFO UserandRole: get_have: 1198: Current State (have): {'role_exists': False} - -07-26-2024 17:42:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated playbook config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:21 INFO UserandRole: get_diff_merged: 1217: Starting the users and roles create/update process... - -07-26-2024 17:42:21 INFO UserandRole: valid_role_config_parameters: 981: Validating role configuration parameters... - -07-26-2024 17:42:21 INFO UserandRole: valid_role_config_parameters: 1070: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:21 DEBUG UserandRole: check_return_status: 230: status: success, msg: Successfully validated config params: {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:21 INFO UserandRole: get_diff_merged: 1245: Creating role with config {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1524: Role operation is 'create'. Adding default assurance entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1591: Role operation is 'create'. Adding default network analytics entries. - -07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1649: Role operation is 'create'. Adding default network design entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Image Repository', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Network Settings', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1715: Role operation is 'create'. Adding default network provision entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Compliance', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.EoX', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.License', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Provision', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1851: Role operation is 'create'. Adding default network services entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1968: Role operation is 'create'. Adding default security entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Group-Based Policy', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Security.Security Advisories', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2042: Role operation is 'create'. Adding default system entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2100: Role operation is 'create'. Adding default utilities entries. - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Event Viewer', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Utilities.Search', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:21 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:42:21 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.Group-Based Policy', 'operations': ['gRead']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: create - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Settings - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: provision - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2601: Permission denied at level: group-based_policy - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: event_viewer - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Event Viewer - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: event_viewer - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:42:21 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Network Settings', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Provision.Provision', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Event Viewer', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:21 DEBUG UserandRole: get_permissions: 2700: Permission check complete. Any denied operations: True - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:42:21 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2517: Removing resource due to denied type: network design.network settings - -07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2525: Removing resource due to denied type: network provision.provision - -07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2540: Removing resource due to denied type: event viewer - -07-26-2024 17:42:21 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: True - -07-26-2024 17:42:21 DEBUG UserandRole: create_role: 1449: Create role with role_info_params: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:23 DEBUG UserandRole: create_role: 1456: Received API response from create_role: {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:42:23 INFO UserandRole: get_diff_merged: 1320: Task respoonse {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}} - -07-26-2024 17:42:23 INFO UserandRole: get_diff_merged: 1326: {'operation': {'response': {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:42:23 DEBUG UserandRole: check_return_status: 230: status: success, msg: {'operation': {'response': {'response': {'roleId': '66a392a64208d746496865e1', 'message': 'Role Test_Role_1 is created successfully.'}}}} - -07-26-2024 17:42:23 INFO UserandRole: get_have: 1184: Starting retrieval of user or role details... - -07-26-2024 17:42:23 DEBUG UserandRole: get_role: 1501: Received API response from get_roles_api: {'response': {'roles': [{'roleId': '6486ce97ff1f0d0c8be622f6', 'name': 'SUPER-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'SUPER-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce97ff1f0d0c8be622f5'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622f9', 'name': 'NETWORK-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'NETWORK-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622f8'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fb', 'name': 'OBSERVER-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'OBSERVER-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fa'], 'type': 'DEFAULT'}, {'roleId': '6486ce98ff1f0d0c8be622fd', 'name': 'TELEMETRY-ADMIN-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-ADMIN-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fc'], 'type': 'SYSTEM'}, {'roleId': '6486ce98ff1f0d0c8be622ff', 'name': 'TELEMETRY-CLIENT-ROLE', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'TELEMETRY-CLIENT-ROLE', 'rolePermissionIdList': ['6486ce98ff1f0d0c8be622fe'], 'type': 'SYSTEM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679428329'}, 'roleId': '66156a04de0e3c3024e060b7', 'name': 'assurance', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'assurance', 'rolePermissionIdList': ['66a3617d4208d74649685b13'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679429937'}, 'roleId': '66156a05de0e3c3024e0618f', 'name': 'design', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'design', 'rolePermissionIdList': ['66a3617d4208d74649685bfa'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679431542'}, 'roleId': '66156a07de0e3c3024e06267', 'name': 'provision', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'provision', 'rolePermissionIdList': ['66a3617e4208d74649685ce0'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679433043'}, 'roleId': '66156a09de0e3c3024e0633f', 'name': 'services', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'services', 'rolePermissionIdList': ['66a3617e4208d74649685dc6'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Bundles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679434736'}, 'roleId': '66156a0ade0e3c3024e06423', 'name': 'platform', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'platform', 'rolePermissionIdList': ['66a3617e4208d74649685eac'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679436235'}, 'roleId': '66156a0cde0e3c3024e064fb', 'name': 'security', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'security', 'rolePermissionIdList': ['66a3617f4208d74649685f92'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead'], 'type': 'Utilities'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679437387'}, 'roleId': '66156a0dde0e3c3024e065d3', 'name': 'system', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'system', 'rolePermissionIdList': ['66a3617f4208d74649686078'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead'], 'type': 'Network Design'}, {'operations': ['gRead'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead'], 'type': 'Network Provision.License'}, {'operations': ['gRead'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead'], 'type': 'Network Services'}, {'operations': ['gRead'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security'}, {'operations': ['gRead'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System'}, {'operations': ['gRead'], 'type': 'System.Basic'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1712679438541'}, 'roleId': '66156a0ede0e3c3024e066ab', 'name': 'utilities', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'utilities', 'rolePermissionIdList': ['66a3617f4208d7464968615e'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Network Settings'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Provision.Provision'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead'], 'type': 'Platform'}, {'operations': ['gRead'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead'], 'type': 'Platform.Reports'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Group-Based Policy'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'System.Basic'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Event Viewer'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead', 'gCreate', 'gUpdate', 'gRemove'], 'type': 'Utilities.Search'}], 'meta': {'createdBy': 'admin', 'created': '1717390142690', 'lastModified': '1717390238774'}, 'roleId': '665d4b9be9362d2d635a0ea3', 'name': 'LTTS_Roles', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'description': 'For LTTS Team', 'rolePermissionIdList': ['66a3617f4208d74649686244'], 'type': 'CUSTOM'}, {'resourceTypes': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'createdBy': 'admin', 'created': '1721995942182'}, 'roleId': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenantId': '6486ce96ff1f0d0c8be622f4', 'rolePermissionIdList': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}]}} - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: lastModified will be deprecated soon. Please use last_modified. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: resourceTypes will be deprecated soon. Please use resource_types. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: createdBy will be deprecated soon. Please use created_by. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: roleId will be deprecated soon. Please use role_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: tenantId will be deprecated soon. Please use tenant_id. - -07-26-2024 17:42:23 DEBUG UserandRole: camel_to_snake_case: 454: rolePermissionIdList will be deprecated soon. Please use role_permission_id_list. - -07-26-2024 17:42:23 DEBUG UserandRole: get_have: 1189: Current role config details (have): {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'} - -07-26-2024 17:42:23 INFO UserandRole: get_have: 1198: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2847: Current State (have): {'role_name': 'Test_Role_1', 'current_role_config': {'resource_types': [{'operations': ['gRead'], 'type': 'Assurance.Monitoring and Troubleshooting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Assurance.Monitoring Settings'}, {'operations': ['gRead'], 'type': 'Assurance.Troubleshooting Tools'}, {'operations': ['gRead'], 'type': 'Network Analytics.Data Access'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Advanced Network Settings'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Design.Image Repository'}, {'operations': ['gRead'], 'type': 'Network Design.Network Hierarchy'}, {'operations': ['gRead'], 'type': 'Network Design.Network Profiles'}, {'operations': ['gRead'], 'type': 'Network Design.Virtual Network'}, {'operations': ['gRead'], 'type': 'Network Provision.Compliance'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.EoX'}, {'operations': ['gRead'], 'type': 'Network Provision.Image Update'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Device Configuration'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Discovery'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Network Device'}, {'operations': ['gRead'], 'type': 'Network Provision.Inventory Management.Port Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Inventory Management.Topology'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.License'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Provision.Network Telemetry'}, {'operations': ['gRead'], 'type': 'Network Provision.PnP'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.App Hosting'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Bonjour'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Stealthwatch'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Network Services.Umbrella'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.APIs'}, {'operations': ['gRead'], 'type': 'Platform.Bundles'}, {'operations': ['gRead'], 'type': 'Platform.Events'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Platform.Reports'}, {'operations': ['gRead'], 'type': 'Security.IP Based Access Control'}, {'operations': ['gRead'], 'type': 'Security.Security Advisories'}, {'operations': ['gRead'], 'type': 'System.Machine Reasoning'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'System.System Management'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Network Reasoner'}, {'operations': ['gRead'], 'type': 'Utilities.Search'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Scheduler'}, {'operations': ['gRead'], 'type': 'Utilities.Audit Log'}, {'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove'], 'type': 'Utilities.Remote Device Support'}], 'meta': {'created_by': 'admin', 'created': '1721995942182'}, 'role_id': '66a392a64208d746496865e1', 'name': 'Test_Role_1', 'tenant_id': '6486ce96ff1f0d0c8be622f4', 'role_permission_id_list': ['66a392a64208d746496865e0'], 'type': 'CUSTOM'}, 'role_exists': True} - -07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2848: Desired State (want): {'role_name': 'Test_Role_1', 'description': None, 'assurance': [{'overall': 'deny', 'monitoring_and_troubleshooting': None, 'monitoring_settings': 'write', 'troubleshooting_tools': 'read'}], 'network_analytics': [{'data_access': None}], 'network_design': [{'overall': 'deny', 'advanced_network_settings': 'write', 'image_repository': 'write', 'network_hierarchy': None, 'network_profiles': 'read', 'network_settings': 'deny', 'virtual_network': 'read'}], 'network_provision': [{'overall': 'deny', 'compliance': None, 'eox': 'write', 'image_update': 'read', 'inventory_management': [{'overall': 'write', 'device_configuration': 'write', 'discovery': 'read', 'network_device': 'write', 'port_management': 'read', 'topology': None}], 'license': 'write', 'network_telemetry': 'write', 'pnp': 'read', 'provision': 'deny'}], 'network_services': [{'overall': 'write', 'app_hosting': 'write', 'bonjour': 'write', 'stealthwatch': None, 'umbrella': 'write'}], 'platform': [{'overall': 'write', 'apis': 'write', 'bundles': 'read', 'events': 'read', 'reports': None}], 'security': [{'overall': 'deny', 'group_based_policy': 'deny', 'ip_based_access_control': 'read', 'security_advisories': None}], 'system': [{'overall': 'write', 'machine_reasoning': 'read', 'system_management': None}], 'utilities': [{'overall': 'deny', 'audit_log': 'read', 'event_viewer': 'deny', 'network_reasoner': 'write', 'remote_device_support': 'write', 'scheduler': 'write', 'search': None}]} - -07-26-2024 17:42:23 INFO UserandRole: verify_diff_merged: 2857: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - -07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2178: Starting payload generation for role... - -07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_assurance_rules... - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1532: Role operation is not 'create'. Skipping default assurance entries. - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1534: Processing assurance rules. - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1552: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1541: Skipping resource monitoring_and_troubleshooting because permission is None - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1556: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource monitoring_settings: {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1556: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:23 WARNING UserandRole: process_assurance_rules: 1578: Added entry for resource troubleshooting_tools: {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']} - -07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_analytics_rules... - -07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1598: Role operation is not 'create'. Skipping default network analytics entries. - -07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1600: Processing network analytics rules. - -07-26-2024 17:42:23 WARNING UserandRole: process_network_analytics_rules: 1607: Skipping resource data_access because permission is None - -07-26-2024 17:42:23 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_design_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1660: Role operation is not 'create'. Skipping default network design entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1662: Processing network design rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource advanced_network_settings: {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource image_repository: {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1669: Skipping resource network_hierarchy because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource network_profiles: {'type': 'Network Design.Network Profiles', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1680: Skipping resource network_settings because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1684: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_design_rules: 1702: Added entry for resource virtual_network: {'type': 'Network Design.Virtual Network', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_provision_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1732: Role operation is not 'create'. Skipping default network provision entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1734: Processing network provision rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1785: Skipping resource compliance because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1824: Added entry for 'eox': {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource image_update: {'type': 'Network Provision.Image Update', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource device_configuration: {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource discovery: {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource network_device: {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1764: Converted sub-permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1782: Added entry for resource port_management: {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1749: Skipping sub-resource topology because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource license: {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1838: Added entry for resource network_telemetry: {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1800: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1831: Added entry for 'pnp': {'type': 'Network Provision.PnP', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_provision_rules: 1796: Skipping resource provision because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_network_services_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1860: Role operation is not 'create'. Skipping default network services entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1862: Processing network services rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource app_hosting: {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource bonjour: {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1869: Skipping resource stealthwatch because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1884: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_network_services_rules: 1900: Added entry for resource umbrella: {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_platform_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1910: Processing platform rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Bundles', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Events', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1948: Added entry for 'apis': {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource bundles: {'type': 'Platform.Bundles', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1932: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1955: Added entry for resource events: {'type': 'Platform.Events', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_platform_rules: 1917: Skipping resource reports because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_security_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1976: Role operation is not 'create'. Skipping default security entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1978: Processing security rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1996: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1996: Skipping resource group_based_policy because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 2000: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 2015: Added entry for 'ip_based_access_control': {'type': 'Security.IP Based Access Control', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_security_rules: 1985: Skipping resource security_advisories because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_system_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2049: Role operation is not 'create'. Skipping default system entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2051: Processing system rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2073: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.Machine Reasoning', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: add_entries: 1512: Added entry: {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2073: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2087: Added entry for resource machine_reasoning: {'type': 'System.Machine Reasoning', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_system_rules: 2058: Skipping resource system_management because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2201: Processing with process_utilities_rules... - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2114: Role operation is not 'create'. Skipping default utilities entries. - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2116: Processing utilities rules. - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource overall because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission read to operations ['gRead'] - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource audit_log: {'type': 'Utilities.Audit Log', 'operations': ['gRead']} - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2134: Skipping resource event_viewer because permission is 'deny' - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource network_reasoner: {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource remote_device_support: {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2138: Converted permission write to operations ['gRead', 'gUpdate', 'gCreate', 'gRemove'] - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2156: Added entry for resource scheduler: {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']} - -07-26-2024 17:42:24 WARNING UserandRole: process_utilities_rules: 2123: Skipping resource search because permission is None - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2212: Generated resource types: [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}] - -07-26-2024 17:42:24 WARNING UserandRole: generate_role_payload: 2218: Generated payload: {'role': 'Test_Role_1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2259: Starting role comparison for updates... - -07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2298: Calling get_permissions to filter permissions... - -07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2666: Starting permission retrieval for role operation: update - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring and Troubleshooting - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_and_troubleshooting - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: monitoring_settings - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Monitoring Settings - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: monitoring_settings - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: troubleshooting_tools - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Assurance.Troubleshooting Tools - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: troubleshooting_tools - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_analytics - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: data_access - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Analytics.Data Access - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_analytics - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: data_access - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: advanced_network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Advanced Network Settings - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: advanced_network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_repository - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Image Repository - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_repository - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_hierarchy - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Hierarchy - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_hierarchy - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_profiles - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Network Profiles - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_profiles - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: virtual_network - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Design.Virtual Network - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: virtual_network - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: compliance - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Compliance - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: compliance - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: eox - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.EoX - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: eox - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: image_update - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Image Update - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: image_update - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: device_configuration - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Device Configuration - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: device_configuration - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: discovery - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Discovery - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: discovery - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_device - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Network Device - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_device - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: port_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Port Management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: port_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: topology - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Inventory Management.Topology - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: topology - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: license - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.License - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: license - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_telemetry - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.Network Telemetry - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_telemetry - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: pnp - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Provision.PnP - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: pnp - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: app_hosting - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.App Hosting - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: app_hosting - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: bonjour - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Bonjour - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: bonjour - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: stealthwatch - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Stealthwatch - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: stealthwatch - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: umbrella - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Network Services.Umbrella - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: umbrella - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: apis - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.APIs - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: apis - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: bundles - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Bundles - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: bundles - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: events - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Events - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: events - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: reports - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Platform.Reports - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: platform - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: reports - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: ip_based_access_control - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.IP Based Access Control - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: ip_based_access_control - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: security_advisories - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Security.Security Advisories - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: security_advisories - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: machine_reasoning - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.Machine Reasoning - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: machine_reasoning - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: system_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: System.System Management - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: system_management - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: network_reasoner - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Network Reasoner - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: network_reasoner - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: search - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Search - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: search - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: scheduler - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Scheduler - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: scheduler - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: audit_log - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Audit Log - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: audit_log - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2599: Navigated to level: remote_device_support - -07-26-2024 17:42:24 DEBUG UserandRole: check_permission: 2608: Final permission check: Denied: False, Allowed: True - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2626: Retrieving operations for resource type: Utilities.Remote Device Support - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: get_operations: 2633: Navigated to level: remote_device_support - -07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2697: Final permissions configuration: {'roleId': '66a392a64208d746496865e1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:24 DEBUG UserandRole: get_permissions: 2703: Permission check complete. Any denied operations: False - -07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2301: Finding denied permissions... - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: role_name - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: role_name - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: description - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: description - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: assurance[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_and_troubleshooting - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].monitoring_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].monitoring_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: assurance[0].troubleshooting_tools - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance[0].troubleshooting_tools - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: assurance[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: assurance - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_analytics - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_analytics[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_analytics[0].data_access - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics[0].data_access - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_analytics[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_analytics - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_design[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].advanced_network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].advanced_network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].image_repository - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].image_repository - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_hierarchy - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_hierarchy - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_profiles - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_profiles - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].network_settings - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_design[0].virtual_network - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design[0].virtual_network - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_design[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_design[0].overall', 'network_design[0].network_settings'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_design - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].compliance - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].compliance - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].eox - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].eox - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].image_update - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].image_update - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_provision[0].inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_provision[0].inventory_management[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].device_configuration - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].discovery - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].network_device - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].port_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management[0].topology - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0].inventory_management[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].inventory_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].license - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].license - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].network_telemetry - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].network_telemetry - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].pnp - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].pnp - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_provision[0].provision - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision[0].provision - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_provision[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['network_provision[0].overall', 'network_provision[0].provision'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_provision - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: network_services[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].app_hosting - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].app_hosting - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].bonjour - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].bonjour - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].stealthwatch - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].stealthwatch - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: network_services[0].umbrella - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services[0].umbrella - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: network_services[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: network_services - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: platform - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: platform[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].apis - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].apis - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].bundles - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].bundles - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].events - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].events - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: platform[0].reports - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform[0].reports - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: platform[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: platform - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: security - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: security[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].group_based_policy - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].group_based_policy - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].ip_based_access_control - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].ip_based_access_control - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: security[0].security_advisories - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security[0].security_advisories - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: security[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['security[0].overall', 'security[0].group_based_policy'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: security - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: system - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: system[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].machine_reasoning - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].machine_reasoning - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: system[0].system_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system[0].system_management - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: system[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are [] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: system - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2477: Processing list with parent_key: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2459: Processing dictionary with parent_key: utilities[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].overall - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].audit_log - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].audit_log - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].event_viewer - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].event_viewer - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].network_reasoner - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].network_reasoner - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].remote_device_support - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].remote_device_support - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].scheduler - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].scheduler - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2466: Checking key: utilities[0].search - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities[0].search - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2481: Found 'deny' at index: utilities[0] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2472: Found 'deny' at key: utilities - -07-26-2024 17:42:24 DEBUG UserandRole: find_denied_permissions: 2483: Denied permissions are ['assurance[0].overall', 'network_design[0].overall', 'network_design[0].network_settings', 'network_provision[0].overall', 'network_provision[0].provision', 'security[0].overall', 'security[0].group_based_policy', 'utilities[0].overall', 'utilities[0].event_viewer'] - -07-26-2024 17:42:24 DEBUG UserandRole: remove_denied_operations: 2502: Starting removal of denied operations. - -07-26-2024 17:42:24 DEBUG UserandRole: remove_denied_operations: 2548: Removal complete. Update required: False - -07-26-2024 17:42:24 WARNING UserandRole: role_requires_update: 2309: No updates required for the role. - -07-26-2024 17:42:24 INFO UserandRole: verify_diff_merged: 2865: The update for role Test_Role_1 has been successfully verified. The updated info - {'roleId': '66a392a64208d746496865e1', 'description': None, 'resourceTypes': [{'type': 'Assurance.Monitoring and Troubleshooting', 'operations': ['gRead']}, {'type': 'Assurance.Monitoring Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Assurance.Troubleshooting Tools', 'operations': ['gRead']}, {'type': 'Network Analytics.Data Access', 'operations': ['gRead']}, {'type': 'Network Design.Advanced Network Settings', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Image Repository', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Design.Network Hierarchy', 'operations': ['gRead']}, {'type': 'Network Design.Network Profiles', 'operations': ['gRead']}, {'type': 'Network Design.Virtual Network', 'operations': ['gRead']}, {'type': 'Network Provision.Compliance', 'operations': ['gRead']}, {'type': 'Network Provision.EoX', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Image Update', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Device Configuration', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Discovery', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Network Device', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Inventory Management.Port Management', 'operations': ['gRead']}, {'type': 'Network Provision.Inventory Management.Topology', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.License', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.Network Telemetry', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Provision.PnP', 'operations': ['gRead']}, {'type': 'Network Services.App Hosting', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Bonjour', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Stealthwatch', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Network Services.Umbrella', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.APIs', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Platform.Bundles', 'operations': ['gRead']}, {'type': 'Platform.Events', 'operations': ['gRead']}, {'type': 'Platform.Reports', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Security.IP Based Access Control', 'operations': ['gRead']}, {'type': 'Security.Security Advisories', 'operations': ['gRead']}, {'type': 'System.Machine Reasoning', 'operations': ['gRead']}, {'type': 'System.System Management', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Network Reasoner', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Search', 'operations': ['gRead']}, {'type': 'Utilities.Scheduler', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}, {'type': 'Utilities.Audit Log', 'operations': ['gRead']}, {'type': 'Utilities.Remote Device Support', 'operations': ['gRead', 'gUpdate', 'gCreate', 'gRemove']}]} - -07-26-2024 17:42:24 DEBUG UserandRole: check_return_status: 230: status: success, msg: The requested role Test_Role_1 is present in the Cisco Catalyst Center and its creation has been verified. - From ccb78b05b6f84cd1b6f701fe8c4f6bc6b7f4a52e Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 10:58:20 +0530 Subject: [PATCH 101/119] Updated the code for user_role_workflow_manager.py --- plugins/modules/user_role_workflow_manager.py | 419 ++++++++---------- 1 file changed, 192 insertions(+), 227 deletions(-) diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index 5bacd0d063..c4884fe4c1 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -43,7 +43,7 @@ elements: dict suboptions: username: - description: The username associated with the user account. + description: The 'username' associated with the user account. type: str first_name: description: The first name of the user. @@ -54,8 +54,8 @@ email: description: - The email address of the user (e.g., syedkhadeerahmed@example.com). - - Used to retrieve user data if the username is forgotten. - - Required for user deletion if the username is forgotten. + - Used to retrieve user data if the 'username' is forgotten. + - Required for user deletion if the 'username' is forgotten. type: str password: description: @@ -942,7 +942,7 @@ def validate_input_yml(self, user_role_details): self.status = "success" return self - self.msg = "Configuration params like username or email or role_name is not available in the playbook" + self.msg = "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" self.log(self.msg, "ERROR") self.status = "failed" return self @@ -1178,7 +1178,7 @@ def get_have(self, input_config): Description: - Queries Cisco Catalyst Center to check if specified user or role exists. - If the input specifies a role name, checks and retrieves current role configuration. - - If the input specifies a username or email, checks and retrieves current user configuration. + - If the input specifies a 'username' or 'email', checks and retrieves current user configuration. - Stores retrieved user or role details in the "have" attribute for later reference. """ self.log("Starting retrieval of user or role details...", "INFO") @@ -1223,7 +1223,7 @@ def get_diff_merged(self, config): if self.have.get("role_exists"): self.valid_role_config_parameters(config).check_return_status() desired_role = self.generate_role_payload(self.want, "update") - self.log("desired role with config {0}".format(str(desired_role)), "INFO") + self.log("desired role with config {0}".format(str(desired_role)), "DEBUG") if "error" not in desired_role: consolidated_data, update_required_param = self.role_requires_update(self.have["current_role_config"], desired_role) @@ -1242,7 +1242,7 @@ def get_diff_merged(self, config): else: # Create the role self.valid_role_config_parameters(config).check_return_status() - self.log("Creating role with config {0}".format(str(config)), "INFO") + self.log("Creating role with config {0}".format(str(config)), "DEBUG") role_info_params = self.generate_role_payload(self.want, "create") if "error" not in role_info_params: @@ -1262,7 +1262,6 @@ def get_diff_merged(self, config): if self.have.get("user_exists"): self.valid_user_config_parameters(config).check_return_status() (consolidated_data, update_required_param) = self.user_requires_update(self.have["current_user_config"], self.have["current_role_id_config"]) - self.log(update_required_param) if not consolidated_data: self.msg = "User does not need any update" @@ -1285,7 +1284,7 @@ def get_diff_merged(self, config): else: # Create the user self.valid_user_config_parameters(config).check_return_status() - self.log("Creating user with config {0}".format(str(config)), "INFO") + self.log("Creating user with config {0}".format(str(config)), "DEBUG") user_params = self.want user_details = {} @@ -1301,7 +1300,7 @@ def get_diff_merged(self, config): if role_id: user_details[key].append(role_id) else: - self.log("Role ID for {0} not found in current_role_id_config".format(str(role_name))) + self.log("Role ID for {0} not found in current_role_id_config".format(str(role_name)), "DEBUG") if "role_list" not in user_details: default_role = self.have.get("current_role_id_config") @@ -1309,7 +1308,6 @@ def get_diff_merged(self, config): user_details["role_list"] = [default_role.get("observer-role")] if user_details.get("role_list"): - self.log("Point") user_info_params = self.snake_to_camel_case(user_details) task_response = self.create_user(user_info_params) else: @@ -1340,11 +1338,11 @@ def get_current_config(self, input_config): - input_config (dict): A dictionary containing input parameters for retrieving user or role details. Returns: - - If username is in input_config: + - If 'username' is in input_config: - user_exists (bool): True if the user exists, False otherwise. - current_user_configuration (dict): Dictionary containing current user details. - current_role_id (dict): Dictionary containing current role IDs. - - If role_name is in input_config: + - If 'role_name' is in input_config: - role_exists (bool): True if the role exists, False otherwise. - current_role_configuration (dict): Dictionary containing current role details. @@ -1509,7 +1507,7 @@ def add_entries(self, entry_types, operations, unique_types): "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry: {0}".format(new_entry)) + self.log("Added entry: {0}".format(new_entry), "DEBUG") def process_assurance_rules(self, role_config, role_operation, unique_types): """ @@ -1519,63 +1517,59 @@ def process_assurance_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "Assurance.Monitoring and Troubleshooting", + "Assurance.Monitoring Settings", + "Assurance.Troubleshooting Tools" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default assurance entries.") - default_entry_types = [ - "Assurance.Monitoring and Troubleshooting", - "Assurance.Monitoring Settings", - "Assurance.Troubleshooting Tools" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default assurance entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default assurance entries.") + self.log("Role operation is not 'create'. Skipping default assurance entries.", "DEBUG") - self.log("Processing assurance rules.") + self.log("Processing assurance rules.", "INFO") # Process each assurance rule if role_config["assurance"] is not None: for assurance_rule in role_config["assurance"]: for resource_name, permission in assurance_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for assurance resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "Assurance.Monitoring and Troubleshooting", - "Assurance.Monitoring Settings", - "Assurance.Troubleshooting Tools" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) elif resource_name == "monitoring_and_troubleshooting": new_entry = { "type": "Assurance.Monitoring and Troubleshooting", "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'monitoring_and_troubleshooting': {0}".format(new_entry)) + self.log("Added entry for 'monitoring_and_troubleshooting': {0}".format(new_entry), "DEBUG") else: new_entry = { "type": "Assurance.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_analytics_rules(self, role_config, role_operation, unique_types): @@ -1586,54 +1580,51 @@ def process_network_analytics_rules(self, role_config, role_operation, unique_ty - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = { + "type": "Network Analytics.Data Access", + "operations": ["gRead"] + } + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default network analytics entries.") - default_entry_types = { - "type": "Network Analytics.Data Access", - "operations": ["gRead"] - } - unique_types[default_entry_types["type"]] = default_entry_types + self.log("Role operation is 'create'. Adding default network analytics entries.", "DEBUG") + unique_types[entry_types["type"]] = entry_types else: - self.log("Role operation is not 'create'. Skipping default network analytics entries.") + self.log("Role operation is not 'create'. Skipping default network analytics entries.", "DEBUG") - self.log("Processing network analytics rules.") + self.log("Processing network analytics rules.", "INFO") # Process each network analytics rule if role_config["network_analytics"] is not None: for network_analytics_rule in role_config["network_analytics"]: for resource_name, permission in network_analytics_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for network analytics resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = { - "type": "Network Analytics.Data Access", - "operations": operations - } - unique_types[overall_entry_types["type"]] = overall_entry_types + unique_types[entry_types["type"]] = entry_types else: new_entry = { "type": "Network Analytics.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_design_rules(self, role_config, role_operation, unique_types): @@ -1644,62 +1635,55 @@ def process_network_design_rules(self, role_config, role_operation, unique_types - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "Network Design.Advanced Network Settings", + "Network Design.Image Repository", + "Network Design.Network Hierarchy", + "Network Design.Network Profiles", + "Network Design.Network Settings", + "Network Design.Virtual Network" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default network design entries.") - default_entry_types = [ - "Network Design.Advanced Network Settings", - "Network Design.Image Repository", - "Network Design.Network Hierarchy", - "Network Design.Network Profiles", - "Network Design.Network Settings", - "Network Design.Virtual Network" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default network design entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default network design entries.") + self.log("Role operation is not 'create'. Skipping default network design entries.", "DEBUG") - self.log("Processing network design rules.") + self.log("Processing network design rules.", "INFO") # Process each network design rule if role_config["network_design"] is not None: for network_design_rule in role_config["network_design"]: for resource_name, permission in network_design_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for network design resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "Network Design.Advanced Network Settings", - "Network Design.Image Repository", - "Network Design.Network Hierarchy", - "Network Design.Network Profiles", - "Network Design.Network Settings", - "Network Design.Virtual Network" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) else: new_entry = { "type": "Network Design.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_provision_rules(self, role_config, role_operation, unique_types): @@ -1710,34 +1694,35 @@ def process_network_provision_rules(self, role_config, role_operation, unique_ty - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "Network Provision.Compliance", + "Network Provision.EoX", + "Network Provision.Image Update", + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology", + "Network Provision.License", + "Network Provision.Network Telemetry", + "Network Provision.PnP", + "Network Provision.Provision" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default network provision entries.") - default_entry_types = [ - "Network Provision.Compliance", - "Network Provision.EoX", - "Network Provision.Image Update", - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology", - "Network Provision.License", - "Network Provision.Network Telemetry", - "Network Provision.PnP", - "Network Provision.Provision" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default network provision entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default network provision entries.") + self.log("Role operation is not 'create'. Skipping default network provision entries.", "DEBUG") - self.log("Processing network provision rules.") + self.log("Processing network provision rules.", "INFO") # Process each network provision rule if role_config["network_provision"] is not None: if not isinstance(role_config["network_provision"], list): error_message = "The given network_provision is not in type: list" - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} for provision in role_config["network_provision"]: @@ -1746,22 +1731,22 @@ def process_network_provision_rules(self, role_config, role_operation, unique_ty # Handle nested inventory_management for sub_resource_name, sub_permission in permission[0].items(): if sub_permission is None: - self.log("Skipping sub-resource {0} because permission is None".format(sub_resource_name)) + self.log("Skipping sub-resource {0} because permission is None".format(sub_resource_name), "DEBUG") continue sub_permission = sub_permission.lower() if sub_permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for network provision for sub-resource {1}".format(sub_permission, sub_resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if sub_permission == "deny": - self.log("Skipping sub-resource {0} because permission is 'deny'".format(sub_resource_name)) + self.log("Skipping sub-resource {0} because permission is 'deny'".format(sub_resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(sub_permission) - self.log("Converted sub-permission {0} to operations {1}".format(sub_permission, operations)) + self.log("Converted sub-permission {0} to operations {1}".format(sub_permission, operations), "DEBUG") if sub_resource_name == "overall": overall_entry_types = [ @@ -1779,63 +1764,49 @@ def process_network_provision_rules(self, role_config, role_operation, unique_ty "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(sub_resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(sub_resource_name, new_entry), "DEBUG") else: if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for network provision resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "Network Provision.Compliance", - "Network Provision.EoX", - "Network Provision.Image Update", - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology", - "Network Provision.License", - "Network Provision.Network Telemetry", - "Network Provision.PnP", - "Network Provision.Provision" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) elif resource_name == "eox": new_entry = { "type": "Network Provision.EoX", "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'eox': {0}".format(new_entry)) + self.log("Added entry for 'eox': {0}".format(new_entry), "DEBUG") elif resource_name == "pnp": new_entry = { "type": "Network Provision.PnP", "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'pnp': {0}".format(new_entry)) + self.log("Added entry for 'pnp': {0}".format(new_entry), "DEBUG") else: new_entry = { "type": "Network Provision.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_services_rules(self, role_config, role_operation, unique_types): @@ -1846,58 +1817,53 @@ def process_network_services_rules(self, role_config, role_operation, unique_typ - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "Network Services.App Hosting", + "Network Services.Bonjour", + "Network Services.Stealthwatch", + "Network Services.Umbrella" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default network services entries.") - default_entry_types = [ - "Network Services.App Hosting", - "Network Services.Bonjour", - "Network Services.Stealthwatch", - "Network Services.Umbrella" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default network services entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default network services entries.") + self.log("Role operation is not 'create'. Skipping default network services entries.", "DEBUG") - self.log("Processing network services rules.") + self.log("Processing network services rules.", "INFO") # Process each network service rule if role_config["network_services"] is not None: for services_rule in role_config["network_services"]: for resource_name, permission in services_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for network services resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "Network Services.App Hosting", - "Network Services.Bonjour", - "Network Services.Stealthwatch", - "Network Services.Umbrella" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) else: new_entry = { "type": "Network Services.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_platform_rules(self, role_config, unique_types): @@ -1907,29 +1873,29 @@ def process_platform_rules(self, role_config, unique_types): - role_config (dict): The role configuration containing platform rules. - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - self.log("Processing platform rules.") + self.log("Processing platform rules.", "INFO") # Process each platform rule if role_config["platform"] is not None: for platform_rule in role_config["platform"]: for resource_name, permission in platform_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for platform resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": overall_entry_types = [ @@ -1945,14 +1911,14 @@ def process_platform_rules(self, role_config, unique_types): "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'apis': {0}".format(new_entry)) + self.log("Added entry for 'apis': {0}".format(new_entry), "DEBUG") else: new_entry = { "type": "Platform.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_security_rules(self, role_config, role_operation, unique_types): @@ -1963,70 +1929,66 @@ def process_security_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "Security.Group-Based Policy", + "Security.IP Based Access Control", + "Security.Security Advisories" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default security entries.") - default_entry_types = [ - "Security.Group-Based Policy", - "Security.IP Based Access Control", - "Security.Security Advisories" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default security entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default security entries.") + self.log("Role operation is not 'create'. Skipping default security entries.", "DEBUG") - self.log("Processing security rules.") + self.log("Processing security rules.", "INFO") # Process each security rule if role_config["security"] is not None: for security_rule in role_config["security"]: for resource_name, permission in security_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for security resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "Security.Group-Based Policy", - "Security.IP Based Access Control", - "Security.Security Advisories" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) elif resource_name == "ip_based_access_control": new_entry = { "type": "Security.IP Based Access Control", "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'ip_based_access_control': {0}".format(new_entry)) + self.log("Added entry for 'ip_based_access_control': {0}".format(new_entry), "DEBUG") elif resource_name == "group_based_policy": new_entry = { "type": "Security.Group-Based Policy", "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'group_based_policy': {0}".format(new_entry)) + self.log("Added entry for 'group_based_policy': {0}".format(new_entry), "DEBUG") else: new_entry = { "type": "Security.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_system_rules(self, role_config, role_operation, unique_types): @@ -2037,54 +1999,51 @@ def process_system_rules(self, role_config, role_operation, unique_types): - role_operation (str): The operation type (e.g., "update"). - unique_types (dict): A dictionary to store the unique resource types and their operations. """ + entry_types = [ + "System.Machine Reasoning", + "System.System Management" + ] + # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default system entries.") - default_entry_types = [ - "System.Machine Reasoning", - "System.System Management" - ] - self.add_entries(default_entry_types, ["gRead"], unique_types) + self.log("Role operation is 'create'. Adding default system entries.", "DEBUG") + self.add_entries(entry_types, ["gRead"], unique_types) else: - self.log("Role operation is not 'create'. Skipping default system entries.") + self.log("Role operation is not 'create'. Skipping default system entries.", "DEBUG") - self.log("Processing system rules.") + self.log("Processing system rules.", "INFO") # Process each system rule if role_config["system"] is not None: for system_rule in role_config["system"]: for resource_name, permission in system_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for system resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": - overall_entry_types = [ - "System.Machine Reasoning", - "System.System Management" - ] - self.add_entries(overall_entry_types, operations, unique_types) + self.add_entries(entry_types, operations, unique_types) else: new_entry = { "type": "System.{0}".format(resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_utilities_rules(self, role_config, role_operation, unique_types): @@ -2097,7 +2056,7 @@ def process_utilities_rules(self, role_config, role_operation, unique_types): """ # Determine if default entries should be added based on role_operation if role_operation == "create": - self.log("Role operation is 'create'. Adding default utilities entries.") + self.log("Role operation is 'create'. Adding default utilities entries.", "DEBUG") default_entry_types = [ "Utilities.Event Viewer", "Utilities.Network Reasoner", @@ -2111,31 +2070,31 @@ def process_utilities_rules(self, role_config, role_operation, unique_types): unique_types[new_entry1["type"]] = new_entry1 else: - self.log("Role operation is not 'create'. Skipping default utilities entries.") + self.log("Role operation is not 'create'. Skipping default utilities entries.", "DEBUG") - self.log("Processing utilities rules.") + self.log("Processing utilities rules.", "INFO") # Process each utilities rule if role_config["utilities"] is not None: for utilities_rule in role_config["utilities"]: for resource_name, permission in utilities_rule.items(): if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name)) + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") continue permission = permission.lower() if permission not in ["read", "write", "deny"]: error_message = "Invalid permission {0} for utilities resource {1}".format(permission, resource_name) - self.log(error_message) + self.log(error_message, "DEBUG") return {"error": error_message} if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name)) + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") continue operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations)) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") if resource_name == "overall": overall_entry_types = [ @@ -2153,7 +2112,7 @@ def process_utilities_rules(self, role_config, role_operation, unique_types): "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry)) + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def generate_role_payload(self, role_config, role_operation): @@ -2175,7 +2134,7 @@ def generate_role_payload(self, role_config, role_operation): - If the permission is valid and not set to "deny", constructs a resource type entry with operations and appends it to resource_types. - The final payload includes the role name, description, and the list of resource types with operations. """ - self.log("Starting payload generation for role...") + self.log("Starting payload generation for role...", "INFO") # Extract role name and description from the configuration role_name = role_config.get("role_name", "") @@ -2198,24 +2157,24 @@ def generate_role_payload(self, role_config, role_operation): # Process each section and check for errors for process_func in processing_functions: func_name = process_func.__name__ - self.log("Processing with {0}...".format(func_name)) + self.log("Processing with {0}...".format(func_name), "DEBUG") if func_name in "process_platform_rules": function_response = process_func(role_config, unique_types) else: function_response = process_func(role_config, role_operation, unique_types) if function_response: - self.log("Error occurred in {0}: {1}".format(func_name, function_response)) + self.log("Error occurred in {0}: {1}".format(func_name, function_response), "DEBUG") return function_response # Construct the final payload resource_types_list = list(unique_types.values()) - self.log("Generated resource types: {0}".format(resource_types_list)) + self.log("Generated resource types: {0}".format(resource_types_list), "DEBUG") payload = { "role": role_name, "description": description, "resourceTypes": resource_types_list } - self.log("Generated payload: {0}".format(payload)) + self.log("Generated payload: {0}".format(payload), "DEBUG") return payload @@ -2256,7 +2215,7 @@ def role_requires_update(self, current_role, desired_role): - Removes denied operations based on denied permissions found in self.want. - Returns values indicating whether updates are required and the updated role information. """ - self.log("Starting role comparison for updates...") + self.log("Starting role comparison for updates...", "INFO") update_required = False update_role_params = {} @@ -2266,12 +2225,12 @@ def role_requires_update(self, current_role, desired_role): if have_resource["type"] == want_resource["type"]: resource_found = True if have_resource["operations"] != want_resource["operations"]: - self.log("Updating operations for resource type {0}.".format(want_resource["type"])) + self.log("Updating operations for resource type {0}.".format(want_resource["type"]), "DEBUG") have_resource["operations"] = want_resource["operations"] update_required = True break if not resource_found: - self.log("Adding new resource type {0} to current role.".format(want_resource["type"])) + self.log("Adding new resource type {0} to current role.".format(want_resource["type"]), "DEBUG") current_role["resource_types"].append(want_resource) update_required = True @@ -2280,7 +2239,7 @@ def role_requires_update(self, current_role, desired_role): current_description = current_role.get("description") if desired_description is not None: if current_description != desired_description: - self.log("Updating description from {0} to {1}.".format(current_description, desired_description)) + self.log("Updating description from {0} to {1}.".format(current_description, desired_description), "DEBUG") update_role_params["description"] = desired_description update_needed = True elif "description" not in update_role_params: @@ -2295,18 +2254,18 @@ def role_requires_update(self, current_role, desired_role): "resourceTypes": current_role["resource_types"] } - self.log("Calling get_permissions to filter permissions...") + self.log("Calling get_permissions to filter permissions...", "DEBUG") filtered_data, overall_update_required = self.get_permissions(self.want, updated_get_have, "update") - self.log("Finding denied permissions...") + self.log("Finding denied permissions...", "DEBUG") denied_permissions = self.find_denied_permissions(self.want) denied_update_required, updated_get_have = self.remove_denied_operations(filtered_data, denied_permissions) if update_required or denied_update_required or overall_update_required: - self.log("Role update required. Changes detected.") + self.log("Role update required. Changes detected.", "DEBUG") return True, updated_get_have - self.log("No updates required for the role.") + self.log("No updates required for the role.", "DEBUG") return False, updated_get_have def user_requires_update(self, current_user, current_role): @@ -2333,7 +2292,7 @@ def user_requires_update(self, current_user, current_role): current_first_name = current_user.get("first_name") if desired_first_name is not None: if current_first_name != desired_first_name: - self.log("Updating first name from {0} to {1}.".format(current_first_name, desired_first_name)) + self.log("Updating first name from {0} to {1}.".format(current_first_name, desired_first_name), "DEBUG") update_user_params["first_name"] = desired_first_name update_needed = True elif "first_name" not in update_user_params: @@ -2346,7 +2305,7 @@ def user_requires_update(self, current_user, current_role): current_last_name = current_user.get("last_name") if desired_last_name is not None: if current_last_name != desired_last_name: - self.log("Updating last name from {0} to {1}.".format(current_last_name, desired_last_name)) + self.log("Updating last name from {0} to {1}.".format(current_last_name, desired_last_name), "DEBUG") update_user_params["last_name"] = desired_last_name update_needed = True elif "last_name" not in update_user_params: @@ -2359,7 +2318,7 @@ def user_requires_update(self, current_user, current_role): current_email = current_user.get("email") if desired_email is not None: if current_email != desired_email: - self.log("Updating email from {0} to {1}.".format(current_email, desired_email)) + self.log("Updating email from {0} to {1}.".format(current_email, desired_email), "DEBUG") update_user_params["email"] = desired_email update_needed = True elif "email" not in update_user_params: @@ -2375,19 +2334,19 @@ def user_requires_update(self, current_user, current_role): if desired_role_name in current_role: role_id = current_role[desired_role_name] if current_role_list[0] != role_id: - self.log("Updating role list with new role ID {0}.".format(role_id)) + self.log("Updating role list with new role ID {0}.".format(role_id), "DEBUG") update_user_params["role_list"] = [role_id] update_needed = True else: update_user_params["role_list"] = current_role_list else: - self.log("Role {0} not found in current_role. Setting role list to empty.".format(desired_role_name)) + self.log("Role {0} not found in current_role. Setting role list to empty.".format(desired_role_name), "DEBUG") update_user_params["role_list"] = [] update_needed = True else: update_user_params["role_list"] = current_role_list - self.log("User update parameters: {0}".format(update_user_params)) + self.log("User update parameters: {0}".format(update_user_params), "DEBUG") return update_needed, update_user_params @@ -2499,7 +2458,7 @@ def remove_denied_operations(self, input_data, denied_permissions): - If a resource type matches any of the denied permissions, it is excluded from the updated input_data. - The method returns values indicating whether any updates were made (update_required) and the updated input_data. """ - self.log("Starting removal of denied operations.", "DEBUG") + self.log("Starting removal of denied operations.", "INFO") resource_types = input_data["resourceTypes"] remaining_resource_types = [] update_required = False @@ -2623,7 +2582,7 @@ def get_operations(self, permissions, resource_type): - If an "overall" permission of "deny" is found, it collects and returns specific permissions that are not denied. - If no specific operations are found or if the "overall" permission is not "deny", it returns an empty list. """ - self.log("Retrieving operations for resource type: {0}".format(resource_type), "DEBUG") + self.log("Retrieving operations for resource type: {0}".format(resource_type), "INFO") keys = resource_type.lower().replace(" ", "_").split(".") current_level = permissions @@ -2663,7 +2622,7 @@ def get_permissions(self, config, input_data, role_operation): - It logs the final permissions configuration and returns the result along with a boolean indicating if any operations are denied. """ - self.log("Starting permission retrieval for role operation: {0}".format(role_operation), "DEBUG") + self.log("Starting permission retrieval for role operation: {0}".format(role_operation), "INFO") permissions = self.parse_config(config) allowed_operations = [] check_deny = [] @@ -2717,10 +2676,12 @@ def get_diff_deleted(self, config): the specified role or user. It logs the response from the deletion operation and updates the status and result accordingly. """ + self.log("Starting the users and roles delete process...", "INFO") + if "role_name" in config: if self.have.get("role_exists"): self.valid_role_config_parameters(config).check_return_status() - self.log("Deleting role with config {0}".format(str(config)), "INFO") + self.log("Deleting role with config {0}".format(str(config)), "DEBUG") current_role = self.have.get("current_role_config") role_id_to_delete = {} @@ -2750,7 +2711,7 @@ def get_diff_deleted(self, config): if "username" in config or "email" in config: if self.have.get("user_exists"): self.valid_user_config_parameters(config).check_return_status() - self.log("Deleting user with config {0}".format(str(config)), "INFO") + self.log("Deleting user with config {0}".format(str(config)), "DEBUG") current_user = self.have.get("current_user_config") user_id_to_delete = {} @@ -2766,7 +2727,7 @@ def get_diff_deleted(self, config): self.log(self.msg, "INFO") return self - self.msg = "Please provide a valid username or email for user deletion" + self.msg = "Please provide a valid 'username' or 'email' for user deletion" self.log(self.msg, "ERROR") self.status = "failed" return self @@ -2842,6 +2803,8 @@ def verify_diff_merged(self, config): has been successfully verified. In case of any mismatch between the playbook input and the Catalyst Center configuration, it logs an appropriate message indicating that the merge task may not have executed successfully. """ + self.log("Verify the users and roles create/update process...", "INFO") + if "role_name" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") @@ -2903,6 +2866,8 @@ def verify_diff_deleted(self, config): - If the specified role or user does not exist, it sets the status to "success" and logs a confirmation message. - If the role or user still exists, it logs a mismatch message indicating the deletion was not executed successfully. """ + self.log("Verify the users and roles delete process...", "INFO") + if "role_name" in config: self.get_have(config) self.log("Current State (have): {0}".format(str(self.have)), "INFO") From 11fd5d397ec06e669a4bae6737688995cacd2db7 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 15:24:19 +0530 Subject: [PATCH 102/119] Updated the user_role_workflow_manager.py file --- plugins/modules/user_role_workflow_manager.py | 821 +++++++++--------- 1 file changed, 401 insertions(+), 420 deletions(-) diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index c4884fe4c1..8a02231dc5 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -848,7 +848,6 @@ from ansible_collections.cisco.dnac.plugins.module_utils.dnac import ( DnacBase, validate_list_of_dicts, - validate_str, validate_list ) from ansible.module_utils.basic import AnsibleModule @@ -947,12 +946,13 @@ def validate_input_yml(self, user_role_details): self.status = "failed" return self - def validate_string_parameter(self, param_name, param_value, error_messages, max_length=255): + def validate_string_parameter(self, param_name, param_value, error_messages): """ Helper function to validate string parameters. """ - param_spec = {"type": "str", "length_max": max_length} - validate_str(param_value, param_spec, param_name, error_messages) + # Check if the parameter value is a string + if not isinstance(param_value, str): + error_messages.append("Parameter '{0}' must be a string.".format(param_name)) def validate_string_field(self, field_value, regex, error_message, error_messages): """ @@ -965,18 +965,16 @@ def valid_role_config_parameters(self, role_config): """ Additional validation for the create role configuration payload. Parameters: - - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - - role_config (dict): A dictionary containing the input configuration details. + - self (object): An instance of a class used for interacting with Cisco Catalyst Center. + - role_config (dict): A dictionary containing the input configuration details. Returns: - The method returns an instance of the class with updated attributes: + The method returns an instance of the class with updated attributes: - self.msg: A message describing the validation result. - self.status: The status of the validation (either "success" or "failed"). Description: - To use this method, create an instance of the class and call "valid_role_config_parameters" on it. - - If the validation succeeds it return "success". + - If the validation succeeds it returns "success". - If it fails, "self.status" will be "failed", and "self.msg" will describe the validation issues. - - To use this method, create an instance of the class and call "valid_role_config_parameters" on it. - - If the validation succeeds, this will allow to go next step, unless this will stop execution based on the fields. """ self.log("Validating role configuration parameters...", "INFO") error_messages = [] @@ -989,76 +987,40 @@ def valid_role_config_parameters(self, role_config): if role_config.get("description"): self.validate_string_parameter("description", role_config["description"], error_messages) - assurance_list = role_config.get("assurance", []) - if assurance_list is not None: - for assurance in assurance_list: - for param in ["overall", "monitoring_and_troubleshooting", "monitoring_settings", "troubleshooting_tools"]: - if assurance.get(param): - self.validate_string_parameter(param, assurance[param], error_messages) - - network_analytics_list = role_config.get("network_analytics", []) - if network_analytics_list is not None: - for network_analytics in network_analytics_list: - for param in ["overall", "data_access"]: - if network_analytics.get(param): - self.validate_string_parameter(param, network_analytics[param], error_messages) - - network_design_list = role_config.get("network_design", []) - if network_design_list is not None: - for network_design in network_design_list: - for param in ["overall", "advanced_network_settings", "image_repository", "network_hierarchy", - "network_profiles", "network_settings", "virtual_network"]: - if network_design.get(param): - self.validate_string_parameter(param, network_design[param], error_messages) - - network_provision_list = role_config.get("network_provision", []) - if network_provision_list is not None: - for network_provision in network_provision_list: - for param in ["overall", "compliance", "image_update", "license", "network_telemetry", "pnp", "provision"]: - if network_provision.get(param): - self.validate_string_parameter(param, network_provision[param], error_messages) - - inventory_management_list = network_provision.get("inventory_management", []) - if inventory_management_list is not None: - for inventory_management in inventory_management_list: - for param in ["overall", "device_configuration", "discovery", "network_device", "port_management", "topology"]: - if inventory_management.get(param): - self.validate_string_parameter(param, inventory_management[param], error_messages) - - network_services_list = role_config.get("network_services", []) - if network_services_list is not None: - for network_services in network_services_list: - for param in ["overall", "app_hosting", "bonjour", "stealthwatch", "umbrella"]: - if network_services.get(param): - self.validate_string_parameter(param, network_services[param], error_messages) - - platform_list = role_config.get("platform", []) - if platform_list is not None: - for platform in platform_list: - for param in ["overall", "apis", "bundles", "events", "reports"]: - if platform.get(param): - self.validate_string_parameter(param, platform[param], error_messages) - - security_list = role_config.get("security", []) - if security_list is not None: - for security in security_list: - for param in ["overall", "group_based_policy", "ip_based_access_control", "security_advisories"]: - if security.get(param): - self.validate_string_parameter(param, security[param], error_messages) - - system_list = role_config.get("system", []) - if system_list is not None: - for system in system_list: - for param in ["overall", "machine_reasoning", "system_management"]: - if system.get(param): - self.validate_string_parameter(param, system[param], error_messages) - - utilities_list = role_config.get("utilities", []) - if utilities_list is not None: - for utilities in utilities_list: - for param in ["overall", "audit_log", "event_viewer", "network_reasoner", "scheduler", "search"]: - if utilities.get(param): - self.validate_string_parameter(param, utilities[param], error_messages) + role_param_map = { + "assurance": ["overall", "monitoring_and_troubleshooting", "monitoring_settings", "troubleshooting_tools"], + "network_analytics": ["overall", "data_access"], + "network_design": ["overall", "advanced_network_settings", "image_repository", "network_hierarchy", "network_profiles", + "network_settings", "virtual_network"], + "network_provision": ["overall", "compliance", "eox", "image_update", "license", "network_telemetry", "pnp", "provision"], + "inventory_management": ["overall", "device_configuration", "discovery", "network_device", "port_management", "topology"], + "network_services": ["overall", "app_hosting", "bonjour", "stealthwatch", "umbrella"], + "platform": ["overall", "apis", "bundles", "events", "reports"], + "security": ["overall", "group_based_policy", "ip_based_access_control", "security_advisories"], + "system": ["overall", "machine_reasoning", "system_management"], + "utilities": ["overall", "audit_log", "event_viewer", "network_reasoner", "remote_device_support", "scheduler", "search"] + } + + def validate_role_parameters(role_key, params_list): + """ + Helper function to validate role parameters. + """ + role_list = role_config.get(role_key, []) + if role_list is not None: + for role in role_list: + for param in params_list: + if role.get(param): + self.validate_string_parameter(param, role[param], error_messages) + + inventory_management_list = role.get("inventory_management", []) + if inventory_management_list is not None: + for inventory_management in inventory_management_list: + for param in role_param_map["inventory_management"]: + if inventory_management.get(param): + self.validate_string_parameter(param, inventory_management[param], error_messages) + + for role_key, params_list in role_param_map.items(): + validate_role_parameters(role_key, params_list) if error_messages: self.msg = "Invalid parameters in playbook config: {0}".format(", ".join(error_messages)) @@ -1530,46 +1492,48 @@ def process_assurance_rules(self, role_config, role_operation, unique_types): else: self.log("Role operation is not 'create'. Skipping default assurance entries.", "DEBUG") + if role_config["assurance"] is None: + return {} + self.log("Processing assurance rules.", "INFO") # Process each assurance rule - if role_config["assurance"] is not None: - for assurance_rule in role_config["assurance"]: - for resource_name, permission in assurance_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue - - permission = permission.lower() - - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for assurance resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} - - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue - - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - elif resource_name == "monitoring_and_troubleshooting": - new_entry = { - "type": "Assurance.Monitoring and Troubleshooting", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'monitoring_and_troubleshooting': {0}".format(new_entry), "DEBUG") - else: - new_entry = { - "type": "Assurance.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + for assurance_rule in role_config["assurance"]: + for resource_name, permission in assurance_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue + + permission = permission.lower() + + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for assurance resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + elif resource_name == "monitoring_and_troubleshooting": + new_entry = { + "type": "Assurance.Monitoring and Troubleshooting", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'monitoring_and_troubleshooting': {0}".format(new_entry), "DEBUG") + else: + new_entry = { + "type": "Assurance.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_analytics_rules(self, role_config, role_operation, unique_types): @@ -1592,39 +1556,41 @@ def process_network_analytics_rules(self, role_config, role_operation, unique_ty else: self.log("Role operation is not 'create'. Skipping default network analytics entries.", "DEBUG") + if role_config["network_analytics"] is None: + return {} + self.log("Processing network analytics rules.", "INFO") # Process each network analytics rule - if role_config["network_analytics"] is not None: - for network_analytics_rule in role_config["network_analytics"]: - for resource_name, permission in network_analytics_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue + for network_analytics_rule in role_config["network_analytics"]: + for resource_name, permission in network_analytics_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue - permission = permission.lower() + permission = permission.lower() - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for network analytics resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network analytics resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - if resource_name == "overall": - unique_types[entry_types["type"]] = entry_types - else: - new_entry = { - "type": "Network Analytics.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + if resource_name == "overall": + unique_types[entry_types["type"]] = entry_types + else: + new_entry = { + "type": "Network Analytics.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_design_rules(self, role_config, role_operation, unique_types): @@ -1651,39 +1617,41 @@ def process_network_design_rules(self, role_config, role_operation, unique_types else: self.log("Role operation is not 'create'. Skipping default network design entries.", "DEBUG") + if role_config["network_design"] is None: + return {} + self.log("Processing network design rules.", "INFO") # Process each network design rule - if role_config["network_design"] is not None: - for network_design_rule in role_config["network_design"]: - for resource_name, permission in network_design_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue + for network_design_rule in role_config["network_design"]: + for resource_name, permission in network_design_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue - permission = permission.lower() + permission = permission.lower() - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for network design resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network design resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - else: - new_entry = { - "type": "Network Design.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + else: + new_entry = { + "type": "Network Design.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_provision_rules(self, role_config, role_operation, unique_types): @@ -1716,97 +1684,99 @@ def process_network_provision_rules(self, role_config, role_operation, unique_ty else: self.log("Role operation is not 'create'. Skipping default network provision entries.", "DEBUG") + if role_config["network_provision"] is None: + return {} + self.log("Processing network provision rules.", "INFO") # Process each network provision rule - if role_config["network_provision"] is not None: - if not isinstance(role_config["network_provision"], list): - error_message = "The given network_provision is not in type: list" - self.log(error_message, "DEBUG") - return {"error": error_message} - - for provision in role_config["network_provision"]: - for resource_name, permission in provision.items(): - if isinstance(permission, list): - # Handle nested inventory_management - for sub_resource_name, sub_permission in permission[0].items(): - if sub_permission is None: - self.log("Skipping sub-resource {0} because permission is None".format(sub_resource_name), "DEBUG") - continue - - sub_permission = sub_permission.lower() - - if sub_permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for network provision for sub-resource {1}".format(sub_permission, sub_resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} - - if sub_permission == "deny": - self.log("Skipping sub-resource {0} because permission is 'deny'".format(sub_resource_name), "DEBUG") - continue - - operations = self.convert_permission_to_operations(sub_permission) - self.log("Converted sub-permission {0} to operations {1}".format(sub_permission, operations), "DEBUG") - - if sub_resource_name == "overall": - overall_entry_types = [ - "Network Provision.Inventory Management.Device Configuration", - "Network Provision.Inventory Management.Discovery", - "Network Provision.Inventory Management.Network Device", - "Network Provision.Inventory Management.Port Management", - "Network Provision.Inventory Management.Topology" - ] - self.add_entries(overall_entry_types, operations, unique_types) - else: - new_entry = { - "type": "Network Provision.{0}.{1}".format(resource_name.replace("_", " ").title(), - sub_resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(sub_resource_name, new_entry), "DEBUG") - else: - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + if not isinstance(role_config["network_provision"], list): + error_message = "The given network_provision is not in type: list" + self.log(error_message, "DEBUG") + return {"error": error_message} + + for provision in role_config["network_provision"]: + for resource_name, permission in provision.items(): + if isinstance(permission, list): + # Handle nested inventory_management + for sub_resource_name, sub_permission in permission[0].items(): + if sub_permission is None: + self.log("Skipping sub-resource {0} because permission is None".format(sub_resource_name), "DEBUG") continue - permission = permission.lower() + sub_permission = sub_permission.lower() - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for network provision resource {1}".format(permission, resource_name) + if sub_permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network provision for sub-resource {1}".format(sub_permission, sub_resource_name) self.log(error_message, "DEBUG") return {"error": error_message} - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + if sub_permission == "deny": + self.log("Skipping sub-resource {0} because permission is 'deny'".format(sub_resource_name), "DEBUG") continue - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - elif resource_name == "eox": - new_entry = { - "type": "Network Provision.EoX", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'eox': {0}".format(new_entry), "DEBUG") - elif resource_name == "pnp": - new_entry = { - "type": "Network Provision.PnP", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'pnp': {0}".format(new_entry), "DEBUG") + operations = self.convert_permission_to_operations(sub_permission) + self.log("Converted sub-permission {0} to operations {1}".format(sub_permission, operations), "DEBUG") + + if sub_resource_name == "overall": + overall_entry_types = [ + "Network Provision.Inventory Management.Device Configuration", + "Network Provision.Inventory Management.Discovery", + "Network Provision.Inventory Management.Network Device", + "Network Provision.Inventory Management.Port Management", + "Network Provision.Inventory Management.Topology" + ] + self.add_entries(overall_entry_types, operations, unique_types) else: new_entry = { - "type": "Network Provision.{0}".format(resource_name.replace("_", " ").title()), + "type": "Network Provision.{0}.{1}".format(resource_name.replace("_", " ").title(), + sub_resource_name.replace("_", " ").title()), "operations": operations } unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + self.log("Added entry for resource {0}: {1}".format(sub_resource_name, new_entry), "DEBUG") + else: + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue + + permission = permission.lower() + + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network provision resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + elif resource_name == "eox": + new_entry = { + "type": "Network Provision.EoX", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'eox': {0}".format(new_entry), "DEBUG") + elif resource_name == "pnp": + new_entry = { + "type": "Network Provision.PnP", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'pnp': {0}".format(new_entry), "DEBUG") + else: + new_entry = { + "type": "Network Provision.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_network_services_rules(self, role_config, role_operation, unique_types): @@ -1831,39 +1801,41 @@ def process_network_services_rules(self, role_config, role_operation, unique_typ else: self.log("Role operation is not 'create'. Skipping default network services entries.", "DEBUG") + if role_config["network_services"] is None: + return {} + self.log("Processing network services rules.", "INFO") # Process each network service rule - if role_config["network_services"] is not None: - for services_rule in role_config["network_services"]: - for resource_name, permission in services_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue + for services_rule in role_config["network_services"]: + for resource_name, permission in services_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue - permission = permission.lower() + permission = permission.lower() - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for network services resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for network services resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - else: - new_entry = { - "type": "Network Services.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + else: + new_entry = { + "type": "Network Services.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_platform_rules(self, role_config, unique_types): @@ -1873,52 +1845,55 @@ def process_platform_rules(self, role_config, unique_types): - role_config (dict): The role configuration containing platform rules. - unique_types (dict): A dictionary to store the unique resource types and their operations. """ - self.log("Processing platform rules.", "INFO") - # Process each platform rule - if role_config["platform"] is not None: - for platform_rule in role_config["platform"]: - for resource_name, permission in platform_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue + if role_config["platform"] is None: + return {} - permission = permission.lower() - - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for platform resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} - - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue - - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + self.log("Processing platform rules.", "INFO") - if resource_name == "overall": - overall_entry_types = [ - "Platform.APIs", - "Platform.Bundles", - "Platform.Events", - "Platform.Reports" - ] - self.add_entries(overall_entry_types, operations, unique_types) - elif resource_name == "apis": - new_entry = { - "type": "Platform.APIs", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'apis': {0}".format(new_entry), "DEBUG") - else: - new_entry = { - "type": "Platform.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + # Process each platform rule + for platform_rule in role_config["platform"]: + for resource_name, permission in platform_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue + + permission = permission.lower() + + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for platform resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + + if resource_name == "overall": + overall_entry_types = [ + "Platform.APIs", + "Platform.Bundles", + "Platform.Events", + "Platform.Reports" + ] + self.add_entries(overall_entry_types, operations, unique_types) + elif resource_name == "apis": + new_entry = { + "type": "Platform.APIs", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'apis': {0}".format(new_entry), "DEBUG") + else: + new_entry = { + "type": "Platform.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_security_rules(self, role_config, role_operation, unique_types): @@ -1942,53 +1917,55 @@ def process_security_rules(self, role_config, role_operation, unique_types): else: self.log("Role operation is not 'create'. Skipping default security entries.", "DEBUG") + if role_config["security"] is None: + return {} + self.log("Processing security rules.", "INFO") # Process each security rule - if role_config["security"] is not None: - for security_rule in role_config["security"]: - for resource_name, permission in security_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue - - permission = permission.lower() - - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for security resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} - - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue - - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - elif resource_name == "ip_based_access_control": - new_entry = { - "type": "Security.IP Based Access Control", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'ip_based_access_control': {0}".format(new_entry), "DEBUG") - elif resource_name == "group_based_policy": - new_entry = { - "type": "Security.Group-Based Policy", - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for 'group_based_policy': {0}".format(new_entry), "DEBUG") - else: - new_entry = { - "type": "Security.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + for security_rule in role_config["security"]: + for resource_name, permission in security_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue + + permission = permission.lower() + + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for security resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + elif resource_name == "ip_based_access_control": + new_entry = { + "type": "Security.IP Based Access Control", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'ip_based_access_control': {0}".format(new_entry), "DEBUG") + elif resource_name == "group_based_policy": + new_entry = { + "type": "Security.Group-Based Policy", + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for 'group_based_policy': {0}".format(new_entry), "DEBUG") + else: + new_entry = { + "type": "Security.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_system_rules(self, role_config, role_operation, unique_types): @@ -2011,39 +1988,41 @@ def process_system_rules(self, role_config, role_operation, unique_types): else: self.log("Role operation is not 'create'. Skipping default system entries.", "DEBUG") + if role_config["system"] is None: + return {} + self.log("Processing system rules.", "INFO") # Process each system rule - if role_config["system"] is not None: - for system_rule in role_config["system"]: - for resource_name, permission in system_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue + for system_rule in role_config["system"]: + for resource_name, permission in system_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue - permission = permission.lower() + permission = permission.lower() - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for system resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for system resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - if resource_name == "overall": - self.add_entries(entry_types, operations, unique_types) - else: - new_entry = { - "type": "System.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + if resource_name == "overall": + self.add_entries(entry_types, operations, unique_types) + else: + new_entry = { + "type": "System.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def process_utilities_rules(self, role_config, role_operation, unique_types): @@ -2072,60 +2051,62 @@ def process_utilities_rules(self, role_config, role_operation, unique_types): else: self.log("Role operation is not 'create'. Skipping default utilities entries.", "DEBUG") + if role_config["utilities"] is None: + return {} + self.log("Processing utilities rules.", "INFO") # Process each utilities rule - if role_config["utilities"] is not None: - for utilities_rule in role_config["utilities"]: - for resource_name, permission in utilities_rule.items(): - if permission is None: - self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") - continue - - permission = permission.lower() - - if permission not in ["read", "write", "deny"]: - error_message = "Invalid permission {0} for utilities resource {1}".format(permission, resource_name) - self.log(error_message, "DEBUG") - return {"error": error_message} - - if permission == "deny": - self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") - continue - - operations = self.convert_permission_to_operations(permission) - self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") - - if resource_name == "overall": - overall_entry_types = [ - "Utilities.Event Viewer", - "Utilities.Network Reasoner", - "Utilities.Search", - "Utilities.Audit Log", - "Utilities.Remote Device Support", - "Utilities.Scheduler" - ] - self.add_entries(overall_entry_types, operations, unique_types) - else: - new_entry = { - "type": "Utilities.{0}".format(resource_name.replace("_", " ").title()), - "operations": operations - } - unique_types[new_entry["type"]] = new_entry - self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") + for utilities_rule in role_config["utilities"]: + for resource_name, permission in utilities_rule.items(): + if permission is None: + self.log("Skipping resource {0} because permission is None".format(resource_name), "DEBUG") + continue + + permission = permission.lower() + + if permission not in ["read", "write", "deny"]: + error_message = "Invalid permission {0} for utilities resource {1}".format(permission, resource_name) + self.log(error_message, "DEBUG") + return {"error": error_message} + + if permission == "deny": + self.log("Skipping resource {0} because permission is 'deny'".format(resource_name), "DEBUG") + continue + + operations = self.convert_permission_to_operations(permission) + self.log("Converted permission {0} to operations {1}".format(permission, operations), "DEBUG") + + if resource_name == "overall": + overall_entry_types = [ + "Utilities.Event Viewer", + "Utilities.Network Reasoner", + "Utilities.Search", + "Utilities.Audit Log", + "Utilities.Remote Device Support", + "Utilities.Scheduler" + ] + self.add_entries(overall_entry_types, operations, unique_types) + else: + new_entry = { + "type": "Utilities.{0}".format(resource_name.replace("_", " ").title()), + "operations": operations + } + unique_types[new_entry["type"]] = new_entry + self.log("Added entry for resource {0}: {1}".format(resource_name, new_entry), "DEBUG") return {} def generate_role_payload(self, role_config, role_operation): """ Generate a role payload for Cisco Catalyst Center. - + Parameters: - self (object): An instance of a class used for interacting with Cisco Catalyst Center. - role_config (dict): A dictionary containing the configuration for the role. - + Returns: - payload (dict): A dictionary containing the payload for the role with processed resource types and operations. - + Description: - Generates a payload for a role based on the given role configuration. - Processes various sections of the role configuration, such as assurance, network analytics, From 55c83bae7592b1ee638bfdb04a4d0499f4b331c8 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 15:33:25 +0530 Subject: [PATCH 103/119] Updated the Unit Testing Files --- .../modules/dnac/fixtures/user_role_workflow_manager.json | 2 +- tests/unit/modules/dnac/test_user_role_workflow_manager.py | 6 +++--- 2 files changed, 4 insertions(+), 4 deletions(-) diff --git a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json index 10783e0639..fd7fe079c9 100644 --- a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json +++ b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json @@ -325,7 +325,7 @@ } }, "delete_non_existing_user_response":{ - "message": "Please provide a valid username or email for user deletion" + "message": "Please provide a valid 'username' or 'email' for user deletion" }, "invalid_param_mandatory_field_not_present_get_user_response":{ "response": { diff --git a/tests/unit/modules/dnac/test_user_role_workflow_manager.py b/tests/unit/modules/dnac/test_user_role_workflow_manager.py index ba64d21c32..74f24cdc30 100644 --- a/tests/unit/modules/dnac/test_user_role_workflow_manager.py +++ b/tests/unit/modules/dnac/test_user_role_workflow_manager.py @@ -322,7 +322,7 @@ def test_user_role_workflow_manager_delete_non_existing_user(self): print(result) self.assertEqual( result.get("msg"), - "Please provide a valid username or email for user deletion" + "Please provide a valid 'username' or 'email' for user deletion" ) def test_user_role_workflow_manager_user_invalid_mandatory_field_not_present_param(self): @@ -368,7 +368,7 @@ def test_user_role_workflow_manager_user_invalid_username_email_not_present_para print(result) self.assertEqual( result.get("msg"), - "Configuration params like username or email or role_name is not available in the playbook" + "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" ) def test_user_role_workflow_manager_user_invalid_param_not_correct_formate(self): @@ -623,7 +623,7 @@ def test_user_role_workflow_manager_role_invalid_param_rolename_not_present(self print(result) self.assertEqual( result.get('msg'), - "Configuration params like username or email or role_name is not available in the playbook" + "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" ) def test_user_role_workflow_manager_role_invalid_param_not_type_list(self): From c122c06661c7adeb022d84e7497c9f69a9fbed17 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 15:37:31 +0530 Subject: [PATCH 104/119] Updated the Unit Testing File --- dnac.log | 0 .../modules/dnac/fixtures/user_role_workflow_manager.json | 4 ++-- 2 files changed, 2 insertions(+), 2 deletions(-) create mode 100644 dnac.log diff --git a/dnac.log b/dnac.log new file mode 100644 index 0000000000..e69de29bb2 diff --git a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json index fd7fe079c9..baf89c9e5c 100644 --- a/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json +++ b/tests/unit/modules/dnac/fixtures/user_role_workflow_manager.json @@ -415,7 +415,7 @@ } }, "user_invalid_username_email_not_present_param_responce":{ - "message": "Configuration params like username or email or role_name is not available in the playbook" + "message": "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" }, "invalid_param_not_correct_formate_get_user_response":{ "response": { @@ -1315,7 +1315,7 @@ "message": "Please provide a valid role_name for role deletion" }, "role_invalid_rolename_not_present_param_response":{ - "message": "Configuration params like username or email or role_name is not available in the playbook" + "message": "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" }, "role_invalid_param_not_type_list_response":{ "message": "Invalid parameter(s) found in playbook: {'overall': 'read'} : is not a valid list" From 80028e7e2543000546d9699642e0927738bcb1c9 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Mon, 29 Jul 2024 17:32:29 +0530 Subject: [PATCH 105/119] Updated the user_role_workflow_manager.py file --- plugins/modules/user_role_workflow_manager.py | 44 +++++++++++-------- 1 file changed, 25 insertions(+), 19 deletions(-) diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index 8a02231dc5..7ffeec4bcb 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -961,6 +961,30 @@ def validate_string_field(self, field_value, regex, error_message, error_message if field_value and not regex.match(field_value): error_messages.append(error_message) + def validate_role_parameters(self, role_key, params_list, role_config, role_param_map, error_messages): + """ + Helper function to validate role parameters. + """ + role_list = role_config.get(role_key, []) + if role_list is not None: + for role in role_list: + self.log("Validating role: {0}".format(role), "DEBUG") + for param in params_list: + if role.get(param): + self.log("Validating parameter '{0}' with value '{1}'".format(param, role[param]), "DEBUG") + self.validate_string_parameter(param, role[param], error_messages) + + if role == "network_provision": + inventory_management_list = role.get("inventory_management", []) + if inventory_management_list is not None: + for inventory_management in inventory_management_list: + self.log("Validating inventory management: {0}".format(inventory_management), "DEBUG") + for param in role_param_map["inventory_management"]: + if inventory_management.get(param): + self.log("Validating inventory management parameter '{0}' with value '{1}'".format(param, inventory_management[param]), + "DEBUG") + self.validate_string_parameter(param, inventory_management[param], error_messages) + def valid_role_config_parameters(self, role_config): """ Additional validation for the create role configuration payload. @@ -1001,26 +1025,8 @@ def valid_role_config_parameters(self, role_config): "utilities": ["overall", "audit_log", "event_viewer", "network_reasoner", "remote_device_support", "scheduler", "search"] } - def validate_role_parameters(role_key, params_list): - """ - Helper function to validate role parameters. - """ - role_list = role_config.get(role_key, []) - if role_list is not None: - for role in role_list: - for param in params_list: - if role.get(param): - self.validate_string_parameter(param, role[param], error_messages) - - inventory_management_list = role.get("inventory_management", []) - if inventory_management_list is not None: - for inventory_management in inventory_management_list: - for param in role_param_map["inventory_management"]: - if inventory_management.get(param): - self.validate_string_parameter(param, inventory_management[param], error_messages) - for role_key, params_list in role_param_map.items(): - validate_role_parameters(role_key, params_list) + self.validate_role_parameters(role_key, params_list, role_config, role_param_map, error_messages) if error_messages: self.msg = "Invalid parameters in playbook config: {0}".format(", ".join(error_messages)) From 8b0ef68a4b647fb39f7fedfb1aeb657ace0e3d4c Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Mon, 29 Jul 2024 20:48:37 +0530 Subject: [PATCH 106/119] Update the notes in the documentation stating that module expects valid input for successful execution. --- plugins/modules/events_and_notifications_workflow_manager.py | 3 +++ 1 file changed, 3 insertions(+) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 2e0e28db76..73fdeb65ea 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -477,6 +477,9 @@ - python >= 3.5 notes: + - To ensure the module operates correctly for scaled sets, which involve creating or updating multiple destinations and handling + event subscription notifications, please provide valid input in the playbook. If any failure is encountered, the module will + halt execution without proceeding to further operations. - Configuring the webhook destination with headers now supports starting from dnacentersdk version 2.9.1 onwards. This enhancement is in alignment with Catalyst Center Release 2.3.7.5. - Configuring the SNMP destination now supports starting from dnacentersdk version 2.9.1 onwards. This enhancement is in From ed79333d9c72793412ac6fa458d3d9b350b4efcf Mon Sep 17 00:00:00 2001 From: Abinash Date: Mon, 29 Jul 2024 15:44:29 +0000 Subject: [PATCH 107/119] Fix for prefix length check --- plugins/modules/discovery_intent.py | 6 +++++- plugins/modules/discovery_workflow_manager.py | 6 +++++- 2 files changed, 10 insertions(+), 2 deletions(-) diff --git a/plugins/modules/discovery_intent.py b/plugins/modules/discovery_intent.py index 8461207587..bb69418fbb 100644 --- a/plugins/modules/discovery_intent.py +++ b/plugins/modules/discovery_intent.py @@ -59,7 +59,7 @@ pass a list with single element like - 10.197.156.22. For CIDR based discovery, we should pass a list with single element like - 10.197.156.22/22. For RANGE based discovery, we should pass a list with single element and range like - 10.197.156.1-10.197.156.100. For MULTI RANGE based discovery, we should pass a list with multiple - elementd like - 10.197.156.1-10.197.156.100 and in next line - 10.197.157.1-10.197.157.100. Maximum of 8 IP address ranges + elements like - 10.197.156.1-10.197.156.100 and in next line - 10.197.157.1-10.197.157.100. Maximum of 8 IP address ranges are allowed. type: list elements: str @@ -1044,6 +1044,10 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] + if int(cidr_notation.split("/")[1]) not in range (20,31): + msg = "Prefix length should be between 20 and 30" + self.log(msg, "CRITICAL") + self.module.fail_json(msg=msg) if len(cidr_notation.split("/")) == 2: ip_address_list = cidr_notation else: diff --git a/plugins/modules/discovery_workflow_manager.py b/plugins/modules/discovery_workflow_manager.py index c6e6161b80..0663560e1b 100644 --- a/plugins/modules/discovery_workflow_manager.py +++ b/plugins/modules/discovery_workflow_manager.py @@ -59,7 +59,7 @@ pass a list with single element like - 10.197.156.22. For CIDR based discovery, we should pass a list with single element like - 10.197.156.22/22. For RANGE based discovery, we should pass a list with single element and range like - 10.197.156.1-10.197.156.100. For MULTI RANGE based discovery, we should pass a list with multiple - elementd like - 10.197.156.1-10.197.156.100 and in next line - 10.197.157.1-10.197.157.100. Maximum of 8 IP address ranges + elements like - 10.197.156.1-10.197.156.100 and in next line - 10.197.157.1-10.197.157.100. Maximum of 8 IP address ranges are allowed. type: list elements: str @@ -1044,6 +1044,10 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] + if int(cidr_notation.split("/")[1]) not in range (20,31): + msg = "Prefix length should be between 20 and 30" + self.log(msg, "CRITICAL") + self.module.fail_json(msg=msg) if len(cidr_notation.split("/")) == 2: ip_address_list = cidr_notation else: From 1bc0f4c1b65667f808ceec5095c9bf1f736fd232 Mon Sep 17 00:00:00 2001 From: Abinash Date: Mon, 29 Jul 2024 16:05:18 +0000 Subject: [PATCH 108/119] Fix for prefix length check --- plugins/modules/discovery_intent.py | 2 +- plugins/modules/discovery_workflow_manager.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/discovery_intent.py b/plugins/modules/discovery_intent.py index bb69418fbb..de0895c087 100644 --- a/plugins/modules/discovery_intent.py +++ b/plugins/modules/discovery_intent.py @@ -1044,7 +1044,7 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] - if int(cidr_notation.split("/")[1]) not in range (20,31): + if int (cidr_notation.split("/")[1]) not in range (20, 31): msg = "Prefix length should be between 20 and 30" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) diff --git a/plugins/modules/discovery_workflow_manager.py b/plugins/modules/discovery_workflow_manager.py index 0663560e1b..57c5fea66b 100644 --- a/plugins/modules/discovery_workflow_manager.py +++ b/plugins/modules/discovery_workflow_manager.py @@ -1044,7 +1044,7 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] - if int(cidr_notation.split("/")[1]) not in range (20,31): + if int (cidr_notation.split("/")[1]) not in range (20, 31): msg = "Prefix length should be between 20 and 30" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) From a7c5acb04a015dd89a07682f644be800ea094bef Mon Sep 17 00:00:00 2001 From: Abinash Date: Mon, 29 Jul 2024 16:14:41 +0000 Subject: [PATCH 109/119] Fix for prefix length check --- plugins/modules/discovery_intent.py | 2 +- plugins/modules/discovery_workflow_manager.py | 2 +- 2 files changed, 2 insertions(+), 2 deletions(-) diff --git a/plugins/modules/discovery_intent.py b/plugins/modules/discovery_intent.py index de0895c087..1442d7b6d1 100644 --- a/plugins/modules/discovery_intent.py +++ b/plugins/modules/discovery_intent.py @@ -1044,7 +1044,7 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] - if int (cidr_notation.split("/")[1]) not in range (20, 31): + if int(cidr_notation.split("/")[1]) not in range(20, 31): msg = "Prefix length should be between 20 and 30" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) diff --git a/plugins/modules/discovery_workflow_manager.py b/plugins/modules/discovery_workflow_manager.py index 57c5fea66b..a0fb15a4e5 100644 --- a/plugins/modules/discovery_workflow_manager.py +++ b/plugins/modules/discovery_workflow_manager.py @@ -1044,7 +1044,7 @@ def preprocess_device_discovery(self, ip_address_list=None): elif discovery_type == "CIDR": if len(ip_address_list) == 1: cidr_notation = ip_address_list[0] - if int (cidr_notation.split("/")[1]) not in range (20, 31): + if int(cidr_notation.split("/")[1]) not in range(20, 31): msg = "Prefix length should be between 20 and 30" self.log(msg, "CRITICAL") self.module.fail_json(msg=msg) From 4931a0333ee283b239089fcad730584311be8cdb Mon Sep 17 00:00:00 2001 From: Abhishek-121 Date: Tue, 30 Jul 2024 09:40:43 +0530 Subject: [PATCH 110/119] Update the notes in documentation --- .../modules/events_and_notifications_workflow_manager.py | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/plugins/modules/events_and_notifications_workflow_manager.py b/plugins/modules/events_and_notifications_workflow_manager.py index 73fdeb65ea..5736328f66 100644 --- a/plugins/modules/events_and_notifications_workflow_manager.py +++ b/plugins/modules/events_and_notifications_workflow_manager.py @@ -477,9 +477,9 @@ - python >= 3.5 notes: - - To ensure the module operates correctly for scaled sets, which involve creating or updating multiple destinations and handling - event subscription notifications, please provide valid input in the playbook. If any failure is encountered, the module will - halt execution without proceeding to further operations. + - To ensure the module operates correctly with scaled sets—such as creating or updating multiple destinations and handling event + subscription notifications—please ensure that valid input is provided in the playbook. If any failure occurs, the module will + halt execution and will not proceed to subsequent operations. - Configuring the webhook destination with headers now supports starting from dnacentersdk version 2.9.1 onwards. This enhancement is in alignment with Catalyst Center Release 2.3.7.5. - Configuring the SNMP destination now supports starting from dnacentersdk version 2.9.1 onwards. This enhancement is in From dd1be697745ad50387003174516e530172a30777 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 30 Jul 2024 11:19:40 +0530 Subject: [PATCH 111/119] Fixed the problem with the shared_secret updation --- .../network_settings_workflow_manager.py | 33 ++++++++++++++++--- 1 file changed, 29 insertions(+), 4 deletions(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index c1c9ec5c0c..14ebc072dd 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -2001,7 +2001,12 @@ def get_want_network(self, network_management_details): return self shared_secret = network_aaa.get("shared_secret") - if shared_secret: + if shared_secret is not None: + if len(shared_secret) < 4: + self.msg = "The shared_secret length should be greater than or equal to 4." + self.status = "failed" + return self + want_network_settings.get("network_aaa").update({ "sharedSecret": shared_secret }) @@ -2068,13 +2073,28 @@ def get_want_network(self, network_management_details): return self shared_secret = client_and_endpoint_aaa.get("shared_secret") - if shared_secret: + if shared_secret is not None: + if len(shared_secret) < 4: + self.msg = "The 'shared_secret' length should be greater than or equal to 4." + self.status = "failed" + return self + want_network_settings.get("clientAndEndpoint_aaa").update({ "sharedSecret": shared_secret }) else: del want_network_settings["clientAndEndpoint_aaa"] + network_aaa = want_network_settings.get("network_aaa") + client_and_endpoint_aaa = want_network_settings.get("clientAndEndpoint_aaa") + if network_aaa and client_and_endpoint_aaa and \ + network_aaa.get("sharedSecret") and \ + client_and_endpoint_aaa.get("sharedSecret") and \ + network_aaa.get("sharedSecret") != client_and_endpoint_aaa.get("sharedSecret"): + self.msg = "The 'shared_secret' of 'network_aaa' and 'client_and_endpoint_aaa' should be same." + self.status = "failed" + return self + all_network_management_details.append(want_network) network_management_index += 1 @@ -2305,10 +2325,15 @@ def update_network(self, network_management): site_name = item.get("site_name") result_network = self.result.get("response")[2].get("network") result_network.get("response").update({site_name: {}}) + have_network_details = self.have.get("network")[network_management_index].get("net_details") + want_network_details = self.want.get("wantNetwork")[network_management_index] + network_aaa = want_network_details.get("settings").get("network_aaa") + client_and_endpoint_aaa = want_network_details.get("settings").get("clientAndEndpoint_aaa") # Check update is required or not - if not self.requires_update(self.have.get("network")[network_management_index].get("net_details"), - self.want.get("wantNetwork")[network_management_index], self.network_obj_params): + if not (network_aaa.get("sharedSecret") or + client_and_endpoint_aaa.get("sharedSecret") or + self.requires_update(have_network_details, want_network_details, self.network_obj_params)): self.log("Network in site '{0}' doesn't require an update.".format(site_name), "INFO") result_network.get("response").get(site_name).update({ From f37bd28ae46fccbd80165b4a706c1e28260ff50e Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 30 Jul 2024 11:23:58 +0530 Subject: [PATCH 112/119] Changes in the error message --- plugins/modules/network_settings_workflow_manager.py | 8 ++++++-- 1 file changed, 6 insertions(+), 2 deletions(-) diff --git a/plugins/modules/network_settings_workflow_manager.py b/plugins/modules/network_settings_workflow_manager.py index 14ebc072dd..fa842025bc 100644 --- a/plugins/modules/network_settings_workflow_manager.py +++ b/plugins/modules/network_settings_workflow_manager.py @@ -2003,7 +2003,9 @@ def get_want_network(self, network_management_details): shared_secret = network_aaa.get("shared_secret") if shared_secret is not None: if len(shared_secret) < 4: - self.msg = "The shared_secret length should be greater than or equal to 4." + self.msg = ( + "The 'shared_secret' length in 'network_aaa' should be greater than or equal to 4." + ) self.status = "failed" return self @@ -2075,7 +2077,9 @@ def get_want_network(self, network_management_details): shared_secret = client_and_endpoint_aaa.get("shared_secret") if shared_secret is not None: if len(shared_secret) < 4: - self.msg = "The 'shared_secret' length should be greater than or equal to 4." + self.msg = ( + "The 'shared_secret' length in 'client_and_endpoint_aaa' should be greater than or equal to 4." + ) self.status = "failed" return self From d9d005b63914197c9607d1bb988f30e3db272dd7 Mon Sep 17 00:00:00 2001 From: Madhan Date: Tue, 30 Jul 2024 14:39:54 +0530 Subject: [PATCH 113/119] Changes in changelog and galaxy --- changelogs/changelog.yaml | 21 +++++++++++++++++++++ galaxy.yml | 2 +- 2 files changed, 22 insertions(+), 1 deletion(-) diff --git a/changelogs/changelog.yaml b/changelogs/changelog.yaml index 7f341b0352..4205ebc162 100644 --- a/changelogs/changelog.yaml +++ b/changelogs/changelog.yaml @@ -932,3 +932,24 @@ releases: - provision_workflow_manager.py - Added attribute 'provisioning' - template_workflow_manager.py - Added attributes 'choices', 'failure_policy' - events_and_notifications_workflow_manager.py - Added attributes 'webhook_event_notification', 'email_event_notification', 'syslog_event_notification' + 6.17.0: + release_date: "2024-07-30" + changes: + release_summary: Code changes in workflow manager modules. + minor_changes: + - Added Circle CI support for integration testing. + - Adding pyzipper support in device_configs workflow manager module. + - Exporting export_device_details_limit in inventory workflow module. + - Adding run_compliance_batch_size support in network_compliance module. + - Changes in provision workflow manager module. + - Checking the device list in swim workflow manager module. + - UT and IT cases for worflow manager modules. + - discovery_intent.py: Changed attribute name 'desc' to 'description'. + - discovery_workflow_manager.py: Changed attribute name 'desc' to 'description'. + - events_and_notifications_worflow_manager.py: Changed attribute names from 'from_email', 'to_email', 'to send_email' and 'recipient_email'. + - inventory_intent.py: added attribute 'export_device_details_limit'. + - inventory_workflow_manager.py: added attribute 'export_device_details_limit'. + - ise_radius_integration_workflow_manager.py: changed the type of 'authentication_policy_server' from 'dict' to 'list'. + - network_compliance_workflow_manager.py: added attribute 'run_compliance_batch_size'. + - network_settings_workflow_manager.py: changed the type of network_management_details from 'dic' to 'list'. + - template_workflow_manager.py: added project_file and payload. diff --git a/galaxy.yml b/galaxy.yml index d78490bb02..bb6f1cfe47 100644 --- a/galaxy.yml +++ b/galaxy.yml @@ -1,7 +1,7 @@ --- namespace: cisco name: dnac -version: 6.16.0 +version: 6.17.0 readme: README.md authors: - Rafael Campos From ed6710f307f224ac335cb06c45612df3793e90fe Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 30 Jul 2024 14:40:30 +0530 Subject: [PATCH 114/119] Added the sanity validation for export templates --- plugins/modules/template_workflow_manager.py | 38 +++++++++++++------- 1 file changed, 26 insertions(+), 12 deletions(-) diff --git a/plugins/modules/template_workflow_manager.py b/plugins/modules/template_workflow_manager.py index acc39a89f2..8d4e339876 100644 --- a/plugins/modules/template_workflow_manager.py +++ b/plugins/modules/template_workflow_manager.py @@ -2041,34 +2041,48 @@ def get_export_template_values(self, export_values): self """ - template_details = self.dnac._exec( + all_project_details = self.dnac._exec( family="configuration_templates", function='get_projects_details' ) + all_project_details = all_project_details.get("response") for values in export_values: project_name = values.get("project_name") self.log("Project name for export template: {0}".format(project_name), "DEBUG") - template_details = template_details.get("response") - self.log("Template details: {0}".format(template_details), "DEBUG") - all_template_details = get_dict_result(template_details, + self.log("Template details: {0}".format(all_project_details), "DEBUG") + project_details = get_dict_result(all_project_details, "name", project_name) - self.log("Template details under the project name {0}: {1}" - .format(project_name, all_template_details), "DEBUG") - all_template_details = all_template_details.get("templates") + if not project_details: + self.msg = ( + "There are no projects with the given project name '{project_name}'." + .format(project_name=project_name) + ) + self.status = "failed" + return self + + all_template_details = project_details.get("templates") + if not all_template_details: + self.msg = ( + "There are no templates associated with the given project name '{project_name}'." + .format(project_name=project_name) + ) + self.status = "failed" + return self + self.log("Template details under the project name {0}: {1}" .format(project_name, all_template_details), "DEBUG") template_name = values.get("template_name") - template_detail = get_dict_result(all_template_details, + template_details = get_dict_result(all_template_details, "name", template_name) self.log("Template details with template name {0}: {1}" - .format(template_name, template_detail), "DEBUG") - if template_detail is None: - self.msg = "Invalid project_name and template_name in export" + .format(template_name, template_details), "DEBUG") + if template_details is None: + self.msg = "Invalid 'project_name' and 'template_name' in export templates." self.status = "failed" return self - self.export_template.append(template_detail.get("id")) + self.export_template.append(template_details.get("id")) self.msg = "Successfully collected the export template IDs" self.status = "success" From aa60ade3c8e555ea393686a9a934a2a28eb6f1b4 Mon Sep 17 00:00:00 2001 From: MUTHU-RAKESH-27 <19cs127@psgitech.ac.in> Date: Tue, 30 Jul 2024 14:46:14 +0530 Subject: [PATCH 115/119] Resolved the sanity errors --- plugins/modules/template_workflow_manager.py | 8 ++++---- 1 file changed, 4 insertions(+), 4 deletions(-) diff --git a/plugins/modules/template_workflow_manager.py b/plugins/modules/template_workflow_manager.py index 8d4e339876..600001943a 100644 --- a/plugins/modules/template_workflow_manager.py +++ b/plugins/modules/template_workflow_manager.py @@ -2051,8 +2051,8 @@ def get_export_template_values(self, export_values): self.log("Project name for export template: {0}".format(project_name), "DEBUG") self.log("Template details: {0}".format(all_project_details), "DEBUG") project_details = get_dict_result(all_project_details, - "name", - project_name) + "name", + project_name) if not project_details: self.msg = ( "There are no projects with the given project name '{project_name}'." @@ -2074,8 +2074,8 @@ def get_export_template_values(self, export_values): .format(project_name, all_template_details), "DEBUG") template_name = values.get("template_name") template_details = get_dict_result(all_template_details, - "name", - template_name) + "name", + template_name) self.log("Template details with template name {0}: {1}" .format(template_name, template_details), "DEBUG") if template_details is None: From 1e68c196694147a21ae35e58cb635d3fdba5eb62 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Tue, 30 Jul 2024 16:16:59 +0530 Subject: [PATCH 116/119] updated user_role_workflow_manager.yml --- playbooks/user_role_workflow_manager.yml | 2 ++ 1 file changed, 2 insertions(+) diff --git a/playbooks/user_role_workflow_manager.yml b/playbooks/user_role_workflow_manager.yml index 3bd5c8faa0..2002034a42 100644 --- a/playbooks/user_role_workflow_manager.yml +++ b/playbooks/user_role_workflow_manager.yml @@ -42,6 +42,8 @@ troubleshooting_tools: "write" network_analytics: - overall: "deny" + - role_name: "Test_Role_2" + description: "Default role creation" network_design: - overall: "deny" image_repository: "read" From ab7206d015e115695ddccd22c41b50469d5a236d Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Tue, 30 Jul 2024 16:36:34 +0530 Subject: [PATCH 117/119] Removed dnac.log file --- dnac.log | 0 1 file changed, 0 insertions(+), 0 deletions(-) delete mode 100644 dnac.log diff --git a/dnac.log b/dnac.log deleted file mode 100644 index e69de29bb2..0000000000 From 82cbdc4f5aafd75c73bf5e9deaa22dd62e1cb93e Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Tue, 30 Jul 2024 16:44:08 +0530 Subject: [PATCH 118/119] Updated user_role_workflow_manager.py file --- plugins/modules/user_role_workflow_manager.py | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/plugins/modules/user_role_workflow_manager.py b/plugins/modules/user_role_workflow_manager.py index 7ffeec4bcb..ad21c28c19 100644 --- a/plugins/modules/user_role_workflow_manager.py +++ b/plugins/modules/user_role_workflow_manager.py @@ -440,7 +440,7 @@ type: str requirements: - dnacentersdk >= 2.7.1 - - python >= 3.10 + - python >= 3.9.19 notes: - SDK Methods used - user_and_roles.UserandRoles.get_user_ap_i From 9975c9c23b230964dcca379473a8a9dadb21d2c8 Mon Sep 17 00:00:00 2001 From: Ajith Andrew J Date: Tue, 30 Jul 2024 19:48:14 +0530 Subject: [PATCH 119/119] Sanity check for unit testing is done --- .../dnac/test_user_role_workflow_manager.py | 32 +++++++++++-------- 1 file changed, 18 insertions(+), 14 deletions(-) diff --git a/tests/unit/modules/dnac/test_user_role_workflow_manager.py b/tests/unit/modules/dnac/test_user_role_workflow_manager.py index 74f24cdc30..ef7e4f9430 100644 --- a/tests/unit/modules/dnac/test_user_role_workflow_manager.py +++ b/tests/unit/modules/dnac/test_user_role_workflow_manager.py @@ -48,8 +48,8 @@ class TestDnacUserRoleWorkflowManager(TestDnacModule): playbook_config_invalid_param_with_all_permision_deny = test_data.get("playbook_config_invalid_param_with_all_permision_deny") playbook_config_invalid_param_rolename_not_correct_formate = test_data.get("playbook_config_invalid_param_rolename_not_correct_formate") playbook_config_invalid_param_type_list_missing = test_data.get("playbook_config_invalid_param_type_list_missing") - playbook_config_invalid_param_role_invalid_permission= test_data.get("playbook_config_invalid_param_role_invalid_permission") - playbook_config_for_creating_default_role = test_data.get("playbook_config_for_creating_default_role") + playbook_config_invalid_param_role_invalid_permission = test_data.get("playbook_config_invalid_param_role_invalid_permission") + playbook_config_for_creating_default_role = test_data.get("playbook_config_for_creating_default_role") playbook_config_invalid_invalid_param_state = test_data.get("playbook_config_invalid_invalid_param_state") def setUp(self): @@ -69,7 +69,6 @@ def tearDown(self): self.mock_dnac_exec.stop() self.mock_dnac_init.stop() - def load_fixtures(self, response=None, device=""): """ Load fixtures for user. @@ -391,7 +390,13 @@ def test_user_role_workflow_manager_user_invalid_param_not_correct_formate(self) print(result) self.assertEqual( result.get("msg"), - "Invalid parameters in playbook config: first_name: 'first_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., last_name: 'last_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters., email: Invalid email format for 'email': ajith.andrewexample.com, password: 'Password' does not meet complexity requirements for password: ajith.andrewexample.com, username: 'Username' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + "Invalid parameters in playbook config: first_name: 'first_name' must only contain letters, \ +numbers, underscores, and hyphens and should not contain spaces or other \ +special characters., last_name: 'last_name' must only contain letters, numbers, underscores, \ +and hyphens and should not contain spaces or other special characters., email: Invalid email format for 'email': ajith.andrewexample.com, \ +password: 'Password' does not meet complexity requirements for password: \ +ajith.andrewexample.com, username: 'Username' must only contain letters, numbers, underscores, \ +and hyphens and should not contain spaces or other special characters." ) def test_user_role_workflow_manager_user_invalid_param_not_type_list(self): @@ -415,7 +420,7 @@ def test_user_role_workflow_manager_user_invalid_param_not_type_list(self): self.assertEqual( result.get('msg'), "Invalid parameter(s) found in playbook: Super-Admin-Role : is not a valid list" - ) + ) def test_user_role_workflow_manager_user_invalid_param_rolelist_not_found(self): """ @@ -438,7 +443,7 @@ def test_user_role_workflow_manager_user_invalid_param_rolelist_not_found(self): self.assertEqual( result.get('msg'), "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" - ) + ) def test_user_role_workflow_manager_user_invalid_param_update_rolelist_not_found(self): """ @@ -461,7 +466,7 @@ def test_user_role_workflow_manager_user_invalid_param_update_rolelist_not_found self.assertEqual( result.get('msg'), "The role name in the user details role_list is not present in the Cisco Catalyst Center, Please provide a valid role name" - ) + ) def test_user_role_workflow_manager_create_role(self): """ @@ -556,8 +561,6 @@ def test_user_role_workflow_manager_role_update_not_needed(self): ) def test_user_role_workflow_manager_delete_existing_role(self): - - """ Test case for user role workflow manager when deleting a role. @@ -600,7 +603,7 @@ def test_user_role_workflow_manager_delete_non_existing_role(self): print(result) self.assertEqual( result.get('msg'), - "Please provide a valid role_name for role deletion" + "Please provide a valid role_name for role deletion" ) def test_user_role_workflow_manager_role_invalid_param_rolename_not_present(self): @@ -624,7 +627,7 @@ def test_user_role_workflow_manager_role_invalid_param_rolename_not_present(self self.assertEqual( result.get('msg'), "Configuration params like 'username' or 'email' or 'role_name' is not available in the playbook" - ) + ) def test_user_role_workflow_manager_role_invalid_param_not_type_list(self): """ @@ -647,7 +650,7 @@ def test_user_role_workflow_manager_role_invalid_param_not_type_list(self): self.assertEqual( result.get('msg'), "Invalid parameter(s) found in playbook: {'overall': 'read'} : is not a valid list" - ) + ) def test_user_role_workflow_manager_role_param_with_all_permision_deny(self): """ @@ -670,7 +673,7 @@ def test_user_role_workflow_manager_role_param_with_all_permision_deny(self): self.assertEqual( result.get('msg'), "An error occurred while creating the role without access-level parameters and permissions" - ) + ) def test_user_role_workflow_manager_role_invalid_param_rolename_not_correct_formate(self): """ @@ -692,7 +695,8 @@ def test_user_role_workflow_manager_role_invalid_param_rolename_not_correct_form print(result) self.assertEqual( result.get("msg"), - "Invalid parameters in playbook config: Role name: 'role_name' must only contain letters, numbers, underscores, and hyphens and should not contain spaces or other special characters." + "Invalid parameters in playbook config: Role name: 'role_name' must only contain letters, numbers, underscores,\ + and hyphens and should not contain spaces or other special characters." ) def test_user_role_workflow_manager_invalid_param_type_list_missing(self):